Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5195.json"
[
{
"target": {
"file": "mm/gup.c",
"function": "follow_page_pte"
},
"digest": {
"length": 2112.0,
"function_hash": "244365433434225671318189218337047827727"
},
"signature_type": "Function",
"id": "CVE-2016-5195-3299d087",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
"deprecated": false,
"signature_version": "v1"
},
{
"target": {
"file": "mm/gup.c",
"function": "faultin_page"
},
"digest": {
"length": 1314.0,
"function_hash": "50421871060394395735251860327609164320"
},
"signature_type": "Function",
"id": "CVE-2016-5195-5ac13b1a",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
"deprecated": false,
"signature_version": "v1"
},
{
"target": {
"file": "mm/gup.c"
},
"digest": {
"line_hashes": [
"107296051698005598711935602990655601534",
"166319132010357855846718976157947066238",
"156408199746299444283773708959921347899",
"38947057551910675309410968469537323577",
"34248897889181233149835289522709820766",
"73498796390470188382657537258464211120",
"25949660698751557286033558091716060066",
"225375715742739344060183097165380188616",
"31182718635998019876352406878668256939",
"2607421179662326112828314412569269355",
"270521724802145802645466946366552999591"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2016-5195-a01e8d63",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
"deprecated": false,
"signature_version": "v1"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5195.json"
[
{
"target": {
"file": "mm/gup.c",
"function": "follow_page_pte"
},
"digest": {
"length": 2112.0,
"function_hash": "244365433434225671318189218337047827727"
},
"signature_type": "Function",
"id": "CVE-2016-5195-5a4b3bdf",
"source": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
"deprecated": false,
"signature_version": "v1"
},
{
"target": {
"file": "mm/gup.c",
"function": "faultin_page"
},
"digest": {
"length": 1314.0,
"function_hash": "50421871060394395735251860327609164320"
},
"signature_type": "Function",
"id": "CVE-2016-5195-e85ca0b4",
"source": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
"deprecated": false,
"signature_version": "v1"
},
{
"target": {
"file": "mm/gup.c"
},
"digest": {
"line_hashes": [
"107296051698005598711935602990655601534",
"166319132010357855846718976157947066238",
"156408199746299444283773708959921347899",
"38947057551910675309410968469537323577",
"34248897889181233149835289522709820766",
"73498796390470188382657537258464211120",
"25949660698751557286033558091716060066",
"225375715742739344060183097165380188616",
"31182718635998019876352406878668256939",
"2607421179662326112828314412569269355",
"270521724802145802645466946366552999591"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2016-5195-f0f5f870",
"source": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
"deprecated": false,
"signature_version": "v1"
}
]