Linux kernel memory subsystem copy on write mechanism contains a race condition vulnerability
Original Release date: 21 Oct 2016 | Last revised: 24 Oct 2016

Overview
The Linux kernel since version 2.6.22 contains a race condition in the way the copy on write mechanism is handled by the memory subsystem, which may be leveraged locally to gain root privileges.

Description

CWE-362: Concurrent Execution using Shared Resource with Improper Synchonization (‘Race Condition’) – CVE-2016-5195
The Linux kernel since version 2.6.22 contains a race condition in the way the copy on write mechanism is handled by the memory subsystem.

A local attacker may leverage this vulnerability in affected systems to gain root privileges.

For more information, including proofs of concept, refer to the Dirty COW disclosure page.Note that this vulnerability is reported as being actively exploited in the wild.

Impact

A local, unprivileged attacker can escalate privileges to root.

Solution

Apply an updateLinux kernel versions 4.8.3, 4.7.9, and 4.4.26 address this vulnerability. Red Hat, Debian, and Ubuntu have released patches. Users should apply patches through their Linux distributions’ normal update process.

Vendor Information (Learn More)
Vendor
Status
Date Notified
Date Updated
CoreOS
Affected
21 Oct 2016
24 Oct 2016
Debian GNU/Linux
Affected
21 Oct 2016
24 Oct 2016
Red Hat, Inc.
Affected
21 Oct 2016
21 Oct 2016
SUSE Linux
Affected
21 Oct 2016
24 Oct 2016
Ubuntu
Affected
21 Oct 2016
24 Oct 2016
Arista Networks, Inc.
Not Affected
21 Oct 2016
24 Oct 2016
Arch Linux
Unknown
21 Oct 2016
21 Oct 2016
CentOS
Unknown
21 Oct 2016
21 Oct 2016
Fedora Project
Unknown
21 Oct 2016
21 Oct 2016
Gentoo Linux
Unknown
21 Oct 2016
21 Oct 2016
openSUSE project
Unknown
21 Oct 2016
21 Oct 2016
Openwall GNU/*/Linux
Unknown
21 Oct 2016
21 Oct 2016
Slackware Linux Inc.
Unknown
21 Oct 2016
21 Oct 2016
Tizen
Unknown
21 Oct 2016
21 Oct 2016
Turbolinux
Unknown
21 Oct 2016
21 Oct 2016
If you are a vendor and your product is affected, let us know.
CVSS Metrics (Learn More)
Group
Score
Vector
Base
6.8
AV:L/AC:L/Au:S/C:C/I:C/A:C
Temporal
5.6
E:F/RL:OF/RC:C
Environmental
5.6
CDP:ND/TD:H/CR:ND/IR:ND/AR:ND

References

Credit
Red Hat credits Phil Oester with reporting this vulnerability.
This document was written by Joel Land.

Other Information
CVE IDs: CVE-2016-5195
Date Public: 20 Oct 2016
Date First Published: 21 Oct 2016
Date Last Updated: 24 Oct 2016
Document Revision: 12

Feedback
If you have feedback, comments, or additional information about this vulnerability, please send us email.

Leave a Reply