7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.879 High
EPSS
Percentile
98.6%
The Linux kernel since version 2.6.22 contains a race condition in the way the copy on write mechanism is handled by the memory subsystem, which may be leveraged locally to gain root privileges.
CWE-362: Concurrent Execution using Shared Resource with Improper Synchonization (‘Race Condition’) - CVE-2016-5195
The Linux kernel since version 2.6.22 contains a race condition in the way the copy on write mechanism is handled by the memory subsystem. A local attacker may leverage this vulnerability in affected systems to gain root privileges. For more information, including proofs of concept, refer to the Dirty COW disclosure page.
Note that this vulnerability is reported as being actively exploited in the wild.
A local, unprivileged attacker can escalate privileges to root.
Apply an update
Linux kernel versions 4.8.3, 4.7.9, and 4.4.26 address this vulnerability. Red Hat, Debian, and Ubuntu have released patches. Users should apply patches through their Linux distributions’ normal update process.
243144
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: October 21, 2016 Updated: October 27, 2016
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: October 21, 2016 Updated: October 24, 2016
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: October 21, 2016 Updated: October 24, 2016
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: October 21, 2016 Updated: October 21, 2016
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: October 21, 2016 Updated: October 24, 2016
Affected
SUSE and the openSUSE project are affected by this issue and we have released updates.
<https://www.suse.com/security/cve/CVE-2016-5195.html>
We are not aware of further vendor information regarding this vulnerability.
Notified: October 21, 2016 Updated: October 24, 2016
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: October 21, 2016 Updated: October 24, 2016
Statement Date: October 24, 2016
Not Affected
Arista Network’s software products EOS and Cloud Vision Portal (CVP) are not exploitable by CVE-2016-5195 (Kernel Local Privilege Escalation).
For further information:
<https://www.arista.com/en/support/advisories-notices/security-advisories/1753-field-notice-0026>
We are not aware of further vendor information regarding this vulnerability.
Updated: November 17, 2016
Statement Date: November 17, 2016
Not Affected
Wanting to state that Peplink Pepwave products are not affected by Dirty COW
Our own announcement:
<https://forum.peplink.com/threads/7579-Unaffected-Security-Notice-for-Dirty-COW-CVE-2016-5195>
We are not aware of further vendor information regarding this vulnerability.
Notified: October 21, 2016 Updated: October 21, 2016
Unknown
We have not received a statement from the vendor.
Notified: October 21, 2016 Updated: October 21, 2016
Unknown
We have not received a statement from the vendor.
Notified: October 21, 2016 Updated: October 21, 2016
Unknown
We have not received a statement from the vendor.
Notified: October 21, 2016 Updated: October 21, 2016
Unknown
We have not received a statement from the vendor.
Notified: October 21, 2016 Updated: October 21, 2016
Unknown
We have not received a statement from the vendor.
Notified: October 21, 2016 Updated: October 21, 2016
Unknown
We have not received a statement from the vendor.
Notified: October 21, 2016 Updated: October 21, 2016
Unknown
We have not received a statement from the vendor.
Notified: October 21, 2016 Updated: October 21, 2016
Unknown
We have not received a statement from the vendor.
View all 16 vendors __View less vendors __
Group | Score | Vector |
---|---|---|
Base | 6.8 | AV:L/AC:L/Au:S/C:C/I:C/A:C |
Temporal | 5.6 | E:F/RL:OF/RC:C |
Environmental | 5.6 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
Red Hat credits Phil Oester with reporting this vulnerability.
This document was written by Joel Land.
CVE IDs: | CVE-2016-5195 |
---|---|
Date Public: | 2016-10-20 Date First Published: |
people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html
access.redhat.com/security/cve/cve-2016-5195
cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.26
cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.9
cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3
cwe.mitre.org/data/definitions/362.html
dirtycow.ninja/
security-tracker.debian.org/tracker/CVE-2016-5195
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.879 High
EPSS
Percentile
98.6%