Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-5195

Опубликовано: 19 окт. 2016
Источник: redhat
CVSS3: 7.8
CVSS2: 6.9

Описание

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.

Отчет

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible. Shipping versions of Fedora are affected and Fedora is aware of this flaw. For additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661

Меры по смягчению последствий

Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4kernelNot affected
Red Hat Enterprise Linux Extended Update Support 5.6kernelOut of support scope
Red Hat Enterprise Linux 5kernelFixedRHSA-2016:212428.10.2016
Red Hat Enterprise Linux 5.6 Long LifekernelFixedRHSA-2016:212731.10.2016
Red Hat Enterprise Linux 5.9 Long LifekernelFixedRHSA-2016:212631.10.2016
Red Hat Enterprise Linux 6kernelFixedRHSA-2016:210526.10.2016
Red Hat Enterprise Linux 6.2 Advanced Update SupportkernelFixedRHSA-2016:213201.11.2016
Red Hat Enterprise Linux 6.4 Advanced Update SupportkernelFixedRHSA-2016:213301.11.2016
Red Hat Enterprise Linux 6.5 Advanced Update SupportkernelFixedRHSA-2016:212027.10.2016
Red Hat Enterprise Linux 6.5 Telco Extended Update SupportkernelFixedRHSA-2016:212027.10.2016

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1384344kernel: mm: privilege escalation via MAP_PRIVATE COW breakage

7.8 High

CVSS3

6.9 Medium

CVSS2

Связанные уязвимости

CVSS3: 7
ubuntu
больше 8 лет назад

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

CVSS3: 7
nvd
больше 8 лет назад

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

CVSS3: 7
debian
больше 8 лет назад

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before ...

suse-cvrf
больше 8 лет назад

Security update for Linux Kernel Live Patch 15 for SLE 12

suse-cvrf
больше 8 лет назад

Security update for the Linux Kernel

7.8 High

CVSS3

6.9 Medium

CVSS2