{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2016-10-20T00:00:00.000Z","descriptions":[{"lang":"en","value":"Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\""}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-08-15T11:06:10.000Z","orgId":"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28","shortName":"Chrome"},"references":[{"name":"RHSA-2016:2107","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2107.html"},{"name":"40616","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/40616/"},{"name":"RHSA-2017:0372","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2017:0372"},{"tags":["x_refsource_CONFIRM"],"url":"https://bto.bluecoat.com/security-advisory/sa134"},{"tags":["x_refsource_CONFIRM"],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"name":"40839","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/40839/"},{"tags":["x_refsource_MISC"],"url":"https://dirtycow.ninja"},{"name":"40847","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/40847/"},{"name":"RHSA-2016:2118","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2118.html"},{"name":"RHSA-2016:2128","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2128.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://source.android.com/security/bulletin/2016-12-01.html"},{"name":"RHSA-2016:2120","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2120.html"},{"name":"[oss-security] 20161026 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2016/10/26/7"},{"name":"RHSA-2016:2133","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2133.html"},{"name":"RHSA-2016:2098","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2098.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03761en_us"},{"name":"VU#243144","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"https://www.kb.cert.org/vuls/id/243144"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1004418"},{"name":"1037078","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id/1037078"},{"tags":["x_refsource_CONFIRM"],"url":"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03722en_us"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20161025-0001/"},{"name":"93793","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/93793"},{"name":"RHSA-2016:2127","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2127.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://security-tracker.debian.org/tracker/CVE-2016-5195"},{"tags":["x_refsource_MISC"],"url":"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs"},{"tags":["x_refsource_CONFIRM"],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03742en_us"},{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619"},{"tags":["x_refsource_CONFIRM"],"url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"},{"tags":["x_refsource_MISC"],"url":"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1384344"},{"tags":["x_refsource_CONFIRM"],"url":"https://access.redhat.com/security/vulnerabilities/2706661"},{"name":"RHSA-2016:2106","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2106.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619"},{"name":"40611","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/40611/"},{"tags":["x_refsource_CONFIRM"],"url":"https://access.redhat.com/security/cve/cve-2016-5195"},{"tags":["x_refsource_CONFIRM"],"url":"https://source.android.com/security/bulletin/2016-11-01.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"},{"name":"RHSA-2016:2124","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2124.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3"},{"name":"RHSA-2016:2105","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2105.html"},{"name":"RHSA-2016:2126","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2126.html"},{"name":"RHSA-2016:2132","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2132.html"},{"name":"RHSA-2016:2110","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2110.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03707en_us"},{"tags":["x_refsource_CONFIRM"],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463"},{"tags":["x_refsource_CONFIRM"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10176"},{"name":"SUSE-SU-2016:2635","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html"},{"name":"SUSE-SU-2016:2659","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html"},{"name":"[oss-security] 20161027 CVE-2016-5195 test case","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2016/10/27/13"},{"name":"USN-3106-2","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3106-2"},{"name":"openSUSE-SU-2016:2583","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html"},{"name":"SUSE-SU-2016:2633","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en"},{"name":"SUSE-SU-2016:2638","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html"},{"name":"openSUSE-SU-2016:2584","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html"},{"name":"SUSE-SU-2016:2658","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html"},{"name":"SUSE-SU-2016:2631","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html"},{"name":"USN-3106-3","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3106-3"},{"tags":["x_refsource_CONFIRM"],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241"},{"name":"SUSE-SU-2016:2655","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html"},{"name":"FEDORA-2016-c3558808cd","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/"},{"name":"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded"},{"name":"SUSE-SU-2016:2637","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html"},{"name":"SUSE-SU-2016:2596","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html"},{"name":"SUSE-SU-2016:2634","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html"},{"name":"20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue","tags":["vendor-advisory","x_refsource_CISCO"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd"},{"name":"20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016","tags":["vendor-advisory","x_refsource_CISCO"],"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux"},{"tags":["x_refsource_CONFIRM"],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770"},{"tags":["x_refsource_CONFIRM"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10177"},{"name":"SUSE-SU-2016:2657","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html"},{"name":"SUSE-SU-2016:2614","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html"},{"name":"USN-3105-2","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3105-2"},{"name":"USN-3107-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3107-1"},{"tags":["x_refsource_CONFIRM"],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774"},{"name":"USN-3107-2","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3107-2"},{"name":"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/540344/100/0/threaded"},{"name":"openSUSE-SU-2016:2625","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html"},{"name":"USN-3106-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3106-1"},{"name":"USN-3106-4","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3106-4"},{"name":"[oss-security] 20161030 Re: CVE-2016-5195 test case","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2016/10/30/1"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"},{"name":"SUSE-SU-2016:2673","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html"},{"name":"USN-3104-2","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3104-2"},{"tags":["x_refsource_CONFIRM"],"url":"http://fortiguard.com/advisory/FG-IR-16-063"},{"tags":["x_refsource_CONFIRM"],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807"},{"name":"SUSE-SU-2016:2629","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html"},{"name":"20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/539611/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"},{"name":"SUSE-SU-2016:2632","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html"},{"name":"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded"},{"name":"USN-3105-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3105-1"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html"},{"name":"SUSE-SU-2016:2630","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html"},{"name":"FEDORA-2016-db4b75b352","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/"},{"name":"FEDORA-2016-c8a0c7eece","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/"},{"name":"[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2016/11/03/7"},{"name":"SUSE-SU-2016:2636","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html"},{"name":"SUSE-SU-2016:3069","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10222"},{"name":"DSA-3696","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2016/dsa-3696"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html"},{"name":"SUSE-SU-2016:2592","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html"},{"name":"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded"},{"name":"20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded"},{"name":"USN-3104-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3104-1"},{"name":"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/540736/100/0/threaded"},{"name":"SUSE-SU-2016:2593","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html"},{"name":"SUSE-SU-2016:3304","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html"},{"name":"[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2016/10/21/1"},{"name":"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/540252/100/0/threaded"},{"name":"SUSE-SU-2016:2585","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html"},{"name":"openSUSE-SU-2016:2649","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-5195"},{"name":"openSUSE-SU-2020:0554","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html"},{"tags":["x_refsource_MISC"],"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026"},{"name":"[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2022/03/07/1"},{"name":"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2022/08/08/2"},{"name":"[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2022/08/08/1"},{"name":"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2022/08/08/7"},{"name":"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2022/08/08/8"},{"name":"[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2022/08/09/4"},{"name":"[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2022/08/15/1"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"chrome-cve-admin@google.com","ID":"CVE-2016-5195","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\""}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"RHSA-2016:2107","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2107.html"},{"name":"40616","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/40616/"},{"name":"RHSA-2017:0372","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2017:0372"},{"name":"https://bto.bluecoat.com/security-advisory/sa134","refsource":"CONFIRM","url":"https://bto.bluecoat.com/security-advisory/sa134"},{"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"name":"40839","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/40839/"},{"name":"https://dirtycow.ninja","refsource":"MISC","url":"https://dirtycow.ninja"},{"name":"40847","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/40847/"},{"name":"RHSA-2016:2118","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2118.html"},{"name":"RHSA-2016:2128","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2128.html"},{"name":"https://source.android.com/security/bulletin/2016-12-01.html","refsource":"CONFIRM","url":"https://source.android.com/security/bulletin/2016-12-01.html"},{"name":"RHSA-2016:2120","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2120.html"},{"name":"[oss-security] 20161026 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2016/10/26/7"},{"name":"RHSA-2016:2133","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2133.html"},{"name":"RHSA-2016:2098","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2098.html"},{"name":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03761en_us","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03761en_us"},{"name":"VU#243144","refsource":"CERT-VN","url":"https://www.kb.cert.org/vuls/id/243144"},{"name":"https://bugzilla.suse.com/show_bug.cgi?id=1004418","refsource":"CONFIRM","url":"https://bugzilla.suse.com/show_bug.cgi?id=1004418"},{"name":"1037078","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1037078"},{"name":"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html","refsource":"CONFIRM","url":"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html"},{"name":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03722en_us","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03722en_us"},{"name":"https://security.netapp.com/advisory/ntap-20161025-0001/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20161025-0001/"},{"name":"93793","refsource":"BID","url":"http://www.securityfocus.com/bid/93793"},{"name":"RHSA-2016:2127","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2127.html"},{"name":"https://security-tracker.debian.org/tracker/CVE-2016-5195","refsource":"CONFIRM","url":"https://security-tracker.debian.org/tracker/CVE-2016-5195"},{"name":"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs","refsource":"MISC","url":"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs"},{"name":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03742en_us","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03742en_us"},{"name":"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619","refsource":"CONFIRM","url":"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619"},{"name":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes","refsource":"CONFIRM","url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"},{"name":"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails","refsource":"MISC","url":"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1384344","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1384344"},{"name":"https://access.redhat.com/security/vulnerabilities/2706661","refsource":"CONFIRM","url":"https://access.redhat.com/security/vulnerabilities/2706661"},{"name":"RHSA-2016:2106","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2106.html"},{"name":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619","refsource":"CONFIRM","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619"},{"name":"40611","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/40611/"},{"name":"https://access.redhat.com/security/cve/cve-2016-5195","refsource":"CONFIRM","url":"https://access.redhat.com/security/cve/cve-2016-5195"},{"name":"https://source.android.com/security/bulletin/2016-11-01.html","refsource":"CONFIRM","url":"https://source.android.com/security/bulletin/2016-11-01.html"},{"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"},{"name":"RHSA-2016:2124","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2124.html"},{"name":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3","refsource":"CONFIRM","url":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3"},{"name":"RHSA-2016:2105","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2105.html"},{"name":"RHSA-2016:2126","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2126.html"},{"name":"RHSA-2016:2132","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2132.html"},{"name":"RHSA-2016:2110","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2110.html"},{"name":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03707en_us","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03707en_us"},{"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463"},{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10176","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10176"},{"name":"SUSE-SU-2016:2635","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html"},{"name":"SUSE-SU-2016:2659","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html"},{"name":"[oss-security] 20161027 CVE-2016-5195 test case","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2016/10/27/13"},{"name":"USN-3106-2","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3106-2"},{"name":"openSUSE-SU-2016:2583","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html"},{"name":"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html"},{"name":"SUSE-SU-2016:2633","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html"},{"name":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en","refsource":"CONFIRM","url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en"},{"name":"SUSE-SU-2016:2638","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html"},{"name":"openSUSE-SU-2016:2584","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html"},{"name":"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html"},{"name":"SUSE-SU-2016:2658","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html"},{"name":"SUSE-SU-2016:2631","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html"},{"name":"USN-3106-3","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3106-3"},{"name":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241"},{"name":"SUSE-SU-2016:2655","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html"},{"name":"FEDORA-2016-c3558808cd","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/"},{"name":"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded"},{"name":"SUSE-SU-2016:2637","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html"},{"name":"SUSE-SU-2016:2596","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html"},{"name":"SUSE-SU-2016:2634","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html"},{"name":"20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue","refsource":"CISCO","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd"},{"name":"20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016","refsource":"CISCO","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux"},{"name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770","refsource":"CONFIRM","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770"},{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10177","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10177"},{"name":"SUSE-SU-2016:2657","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html"},{"name":"SUSE-SU-2016:2614","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html"},{"name":"USN-3105-2","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3105-2"},{"name":"USN-3107-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3107-1"},{"name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774","refsource":"CONFIRM","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774"},{"name":"USN-3107-2","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3107-2"},{"name":"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/540344/100/0/threaded"},{"name":"openSUSE-SU-2016:2625","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html"},{"name":"USN-3106-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3106-1"},{"name":"USN-3106-4","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3106-4"},{"name":"[oss-security] 20161030 Re: CVE-2016-5195 test case","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2016/10/30/1"},{"name":"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"},{"name":"SUSE-SU-2016:2673","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html"},{"name":"USN-3104-2","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3104-2"},{"name":"http://fortiguard.com/advisory/FG-IR-16-063","refsource":"CONFIRM","url":"http://fortiguard.com/advisory/FG-IR-16-063"},{"name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807","refsource":"CONFIRM","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807"},{"name":"SUSE-SU-2016:2629","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html"},{"name":"20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/539611/100/0/threaded"},{"name":"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"},{"name":"SUSE-SU-2016:2632","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html"},{"name":"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded"},{"name":"USN-3105-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3105-1"},{"name":"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html"},{"name":"SUSE-SU-2016:2630","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html"},{"name":"FEDORA-2016-db4b75b352","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/"},{"name":"FEDORA-2016-c8a0c7eece","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/"},{"name":"[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2016/11/03/7"},{"name":"SUSE-SU-2016:2636","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html"},{"name":"SUSE-SU-2016:3069","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html"},{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10222","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10222"},{"name":"DSA-3696","refsource":"DEBIAN","url":"http://www.debian.org/security/2016/dsa-3696"},{"name":"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html"},{"name":"SUSE-SU-2016:2592","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html"},{"name":"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded"},{"name":"20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded"},{"name":"USN-3104-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3104-1"},{"name":"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/540736/100/0/threaded"},{"name":"SUSE-SU-2016:2593","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html"},{"name":"SUSE-SU-2016:3304","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html"},{"name":"[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2016/10/21/1"},{"name":"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/540252/100/0/threaded"},{"name":"SUSE-SU-2016:2585","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html"},{"name":"openSUSE-SU-2016:2649","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html"},{"name":"https://security.paloaltonetworks.com/CVE-2016-5195","refsource":"CONFIRM","url":"https://security.paloaltonetworks.com/CVE-2016-5195"},{"name":"openSUSE-SU-2020:0554","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html"},{"name":"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026","refsource":"MISC","url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026"},{"name":"[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2022/03/07/1"},{"name":"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2022/08/08/2"},{"name":"[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2022/08/08/1"},{"name":"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2022/08/08/7"},{"name":"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2022/08/08/8"},{"name":"[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2022/08/09/4"},{"name":"[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2022/08/15/1"}]}}},"adp":[{"title":"CVE Program Container","references":[{"name":"RHSA-2016:2107","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2107.html"},{"name":"40616","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/40616/"},{"name":"RHSA-2017:0372","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2017:0372"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bto.bluecoat.com/security-advisory/sa134"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"name":"40839","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/40839/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://dirtycow.ninja"},{"name":"40847","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/40847/"},{"name":"RHSA-2016:2118","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2118.html"},{"name":"RHSA-2016:2128","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2128.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://source.android.com/security/bulletin/2016-12-01.html"},{"name":"RHSA-2016:2120","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2120.html"},{"name":"[oss-security] 20161026 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2016/10/26/7"},{"name":"RHSA-2016:2133","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2133.html"},{"name":"RHSA-2016:2098","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2098.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03761en_us"},{"name":"VU#243144","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"https://www.kb.cert.org/vuls/id/243144"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1004418"},{"name":"1037078","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id/1037078"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03722en_us"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20161025-0001/"},{"name":"93793","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/93793"},{"name":"RHSA-2016:2127","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2127.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security-tracker.debian.org/tracker/CVE-2016-5195"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03742en_us"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1384344"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://access.redhat.com/security/vulnerabilities/2706661"},{"name":"RHSA-2016:2106","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2106.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619"},{"name":"40611","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/40611/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://access.redhat.com/security/cve/cve-2016-5195"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://source.android.com/security/bulletin/2016-11-01.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"},{"name":"RHSA-2016:2124","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2124.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3"},{"name":"RHSA-2016:2105","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2105.html"},{"name":"RHSA-2016:2126","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2126.html"},{"name":"RHSA-2016:2132","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2132.html"},{"name":"RHSA-2016:2110","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-2110.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03707en_us"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10176"},{"name":"SUSE-SU-2016:2635","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html"},{"name":"SUSE-SU-2016:2659","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html"},{"name":"[oss-security] 20161027 CVE-2016-5195 test case","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2016/10/27/13"},{"name":"USN-3106-2","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3106-2"},{"name":"openSUSE-SU-2016:2583","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html"},{"name":"SUSE-SU-2016:2633","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en"},{"name":"SUSE-SU-2016:2638","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html"},{"name":"openSUSE-SU-2016:2584","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html"},{"name":"SUSE-SU-2016:2658","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html"},{"name":"SUSE-SU-2016:2631","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html"},{"name":"USN-3106-3","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3106-3"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241"},{"name":"SUSE-SU-2016:2655","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html"},{"name":"FEDORA-2016-c3558808cd","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/"},{"name":"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded"},{"name":"SUSE-SU-2016:2637","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html"},{"name":"SUSE-SU-2016:2596","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html"},{"name":"SUSE-SU-2016:2634","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html"},{"name":"20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue","tags":["vendor-advisory","x_refsource_CISCO","x_transferred"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd"},{"name":"20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016","tags":["vendor-advisory","x_refsource_CISCO","x_transferred"],"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10177"},{"name":"SUSE-SU-2016:2657","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html"},{"name":"SUSE-SU-2016:2614","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html"},{"name":"USN-3105-2","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3105-2"},{"name":"USN-3107-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3107-1"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774"},{"name":"USN-3107-2","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3107-2"},{"name":"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/540344/100/0/threaded"},{"name":"openSUSE-SU-2016:2625","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html"},{"name":"USN-3106-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3106-1"},{"name":"USN-3106-4","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3106-4"},{"name":"[oss-security] 20161030 Re: CVE-2016-5195 test case","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2016/10/30/1"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"},{"name":"SUSE-SU-2016:2673","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html"},{"name":"USN-3104-2","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3104-2"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://fortiguard.com/advisory/FG-IR-16-063"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807"},{"name":"SUSE-SU-2016:2629","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html"},{"name":"20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/539611/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"},{"name":"SUSE-SU-2016:2632","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html"},{"name":"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded"},{"name":"USN-3105-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3105-1"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html"},{"name":"SUSE-SU-2016:2630","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html"},{"name":"FEDORA-2016-db4b75b352","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/"},{"name":"FEDORA-2016-c8a0c7eece","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/"},{"name":"[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2016/11/03/7"},{"name":"SUSE-SU-2016:2636","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html"},{"name":"SUSE-SU-2016:3069","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10222"},{"name":"DSA-3696","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2016/dsa-3696"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html"},{"name":"SUSE-SU-2016:2592","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html"},{"name":"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded"},{"name":"20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded"},{"name":"USN-3104-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3104-1"},{"name":"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/540736/100/0/threaded"},{"name":"SUSE-SU-2016:2593","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html"},{"name":"SUSE-SU-2016:3304","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html"},{"name":"[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2016/10/21/1"},{"name":"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/540252/100/0/threaded"},{"name":"SUSE-SU-2016:2585","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html"},{"name":"openSUSE-SU-2016:2649","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.paloaltonetworks.com/CVE-2016-5195"},{"name":"openSUSE-SU-2020:0554","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026"},{"name":"[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/03/07/1"},{"name":"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/08/08/2"},{"name":"[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/08/08/1"},{"name":"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/08/08/7"},{"name":"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/08/08/8"},{"name":"[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/08/09/4"},{"name":"[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/08/15/1"},{"url":"http://seclists.org/fulldisclosure/2024/Aug/35"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T16:09:08.278Z"}},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2016-5195","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-01-29T17:18:38.253279Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2022-03-03","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-5195"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-5195","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-362","description":"CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"}]}],"timeline":[{"time":"2022-03-03T00:00:00.000Z","lang":"en","value":"CVE-2016-5195 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:55:48.198Z"}}]},"cveMetadata":{"assignerOrgId":"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28","assignerShortName":"Chrome","cveId":"CVE-2016-5195","datePublished":"2016-11-10T21:00:00.000Z","dateReserved":"2016-05-31T00:00:00.000Z","dateUpdated":"2025-11-04T16:09:08.278Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"}