Overview
The Linux kernel since version 2.6.22 contains a race condition in the way the copy on write mechanism is handled by the memory subsystem, which may be leveraged locally to gain root privileges.
Description
CWE-362: Concurrent Execution using Shared Resource with Improper Synchonization ('Race Condition') - CVE-2016-5195 The Linux kernel since version 2.6.22 contains a race condition in the way the copy on write mechanism is handled by the memory subsystem. A local attacker may leverage this vulnerability in affected systems to gain root privileges. For more information, including proofs of concept, refer to the Dirty COW disclosure page. |
Impact
A local, unprivileged attacker can escalate privileges to root. |
Solution
Apply an update |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6.8 | AV:L/AC:L/Au:S/C:C/I:C/A:C |
Temporal | 5.6 | E:F/RL:OF/RC:C |
Environmental | 5.6 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- https://dirtycow.ninja/
- https://access.redhat.com/security/cve/cve-2016-5195
- https://security-tracker.debian.org/tracker/CVE-2016-5195
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.9
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.26
- https://cwe.mitre.org/data/definitions/362.html
Acknowledgements
Red Hat credits Phil Oester with reporting this vulnerability.
This document was written by Joel Land.
Other Information
CVE IDs: | CVE-2016-5195 |
Date Public: | 2016-10-20 |
Date First Published: | 2016-10-21 |
Date Last Updated: | 2016-11-17 13:17 UTC |
Document Revision: | 15 |