Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-5195

Опубликовано: 10 нояб. 2016
Источник: debian

Описание

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.7.8-1package

Примечания

  • https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails

  • Fixed by: https://git.kernel.org/linus/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619

Связанные уязвимости

CVSS3: 7
ubuntu
больше 8 лет назад

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

CVSS3: 7.8
redhat
больше 8 лет назад

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

CVSS3: 7
nvd
больше 8 лет назад

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

suse-cvrf
больше 8 лет назад

Security update for Linux Kernel Live Patch 15 for SLE 12

suse-cvrf
больше 8 лет назад

Security update for the Linux Kernel