First published: Thu Oct 13 2016(Updated: )
A race condition was found in the way Linux kernel's memory subsystem handled breakage of the read only private mappings COW situation on write access. An unprivileged local user could use this flaw to gain write access to otherwise read only memory mappings and thus increase their privileges on the system. Red Hat is aware of this issue and if you have questions about the affectedness of your system please contact Red Hat Support. For additional information see <a href="https://access.redhat.com/security/vulnerabilities/2706661">https://access.redhat.com/security/vulnerabilities/2706661</a>
Credit: chrome-cve-admin@google.com chrome-cve-admin@google.com chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Android | ||
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =16.10 | |
Linux Kernel | >=2.6.22<3.2.83 | |
Linux Kernel | >=3.3<3.4.113 | |
Linux Kernel | >=3.5<3.10.104 | |
Linux Kernel | >=3.11<3.12.66 | |
Linux Kernel | >=3.13<3.16.38 | |
Linux Kernel | >=3.17<3.18.44 | |
Linux Kernel | >=3.19<4.1.35 | |
Linux Kernel | >=4.2<4.4.26 | |
Linux Kernel | >=4.5<4.7.9 | |
Linux Kernel | >=4.8<4.8.3 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
redhat enterprise linux aus | =6.2 | |
redhat enterprise linux aus | =6.4 | |
redhat enterprise linux aus | =6.5 | |
redhat enterprise Linux eus | =6.6 | |
redhat enterprise Linux eus | =6.7 | |
redhat enterprise Linux eus | =7.1 | |
Red Hat Enterprise Linux | =5.6 | |
Red Hat Enterprise Linux | =5.9 | |
redhat enterprise linux tus | =6.5 | |
Debian | =7.0 | |
Debian | =8.0 | |
Fedora | =23 | |
Fedora | =24 | |
Fedora | =25 | |
Palo Alto Networks PAN-OS | >=5.1<7.0.14 | |
Palo Alto Networks PAN-OS | >=7.1.0<7.1.8 | |
netapp cloud backup | ||
NetApp HCI Storage Nodes | ||
NetApp OnCommand Balance | ||
NetApp OnCommand Performance Manager | ||
NetApp OnCommand Unified Manager | ||
NetApp ONTAP Select Deploy | ||
NetApp SnapProtect | ||
netapp solidfire |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5195 is considered a high severity vulnerability due to its potential for privilege escalation.
To fix CVE-2016-5195, update your Linux kernel to a version that has addressed this vulnerability.
CVE-2016-5195 affects multiple versions of the Linux kernel from 2.6.22 up to version 4.8.3.
Yes, unprivileged local users can exploit CVE-2016-5195 to gain unauthorized write access to read-only memory mappings.
CVE-2016-5195 impacts various systems, including Ubuntu, Red Hat Enterprise Linux, and Debian.