Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
Metrics
Affected Vendors & Products
References
History
Wed, 29 Jan 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Wed, 14 Aug 2024 00:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: Chrome
Published:
Updated: 2025-01-29T17:18:43.067Z
Reserved: 2016-05-31T00:00:00.000Z
Link: CVE-2016-5195

Updated: 2024-08-06T00:53:48.930Z

Status : Modified
Published: 2016-11-10T21:59:00.197
Modified: 2025-01-29T18:15:28.220
Link: CVE-2016-5195
