Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-5195

Опубликовано: 10 нояб. 2016
Источник: debian
EPSS Критический

Описание

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.7.8-1package

Примечания

  • https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails

  • Fixed by: https://git.kernel.org/linus/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619

EPSS

Процентиль: 100%
0.94176
Критический

Связанные уязвимости

CVSS3: 7
ubuntu
почти 9 лет назад

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

CVSS3: 7.8
redhat
почти 9 лет назад

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

CVSS3: 7
nvd
почти 9 лет назад

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

suse-cvrf
почти 9 лет назад

Security update for Linux Kernel Live Patch 15 for SLE 12

suse-cvrf
почти 9 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 100%
0.94176
Критический