search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Linux kernel memory subsystem copy on write mechanism contains a race condition vulnerability

Vulnerability Note VU#243144

Original Release Date: 2016-10-21 | Last Revised: 2016-11-17

Overview

The Linux kernel since version 2.6.22 contains a race condition in the way the copy on write mechanism is handled by the memory subsystem, which may be leveraged locally to gain root privileges.

Description

CWE-362: Concurrent Execution using Shared Resource with Improper Synchonization ('Race Condition') - CVE-2016-5195

The Linux kernel since version 2.6.22 contains a race condition in the way the copy on write mechanism is handled by the memory subsystem. A local attacker may leverage this vulnerability in affected systems to gain root privileges. For more information, including proofs of concept, refer to the Dirty COW disclosure page.

Note that this vulnerability is reported as being actively exploited in the wild.

Impact

A local, unprivileged attacker can escalate privileges to root.

Solution

Apply an update

Linux kernel versions 4.8.3, 4.7.9, and 4.4.26 address this vulnerability. Red Hat, Debian, and Ubuntu have released patches. Users should apply patches through their Linux distributions' normal update process.

Vendor Information

243144
 

View all 16 vendors View less vendors


CVSS Metrics

Group Score Vector
Base 6.8 AV:L/AC:L/Au:S/C:C/I:C/A:C
Temporal 5.6 E:F/RL:OF/RC:C
Environmental 5.6 CDP:ND/TD:H/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Red Hat credits Phil Oester with reporting this vulnerability.

This document was written by Joel Land.

Other Information

CVE IDs: CVE-2016-5195
Date Public: 2016-10-20
Date First Published: 2016-10-21
Date Last Updated: 2016-11-17 13:17 UTC
Document Revision: 15

Sponsored by CISA.