{
  "name": "CVE-2016-5195",
  "CVE": [
    [
      "CVE-2016-5195",
      "Bulletin-CVE-2016-5195"
    ]
  ],
  "Coordinated_disclosure": "unknown",
  "Categories": [
    "Elevation of privilege vulnerability in kernel memory subsystem"
  ],
  "Details": [
    [
      "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
      "NIST-CVE-2016-5195"
    ]
  ],
  "Discovered_on": [],
  "Discovered_by": [],
  "Submission": [
    {
      "by": "dcc52",
      "on": "2019-07-29"
    }
  ],
  "Reported_on": [
    [
      "2016-11-01",
      "Bulletin-CVE-2016-5195"
    ]
  ],
  "Fixed_on": [
    [
      "2016-10-13",
      "Upstream kernel"
    ]
  ],
  "Fix_released_on": [],
  "Affected_versions": [],
  "Affected_devices": [],
  "Affected_versions_regexp": [
    ""
  ],
  "Affected_manufacturers": [
    [
      "all",
      "Bulletin-CVE-2016-5195"
    ]
  ],
  "Fixed_versions": [],
  "Fixed_versions_regexp": [
    ""
  ],
  "references": {
    "Upstream kernel": {
      "url": "https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=9691eac5593ff1e2f82391ad327f21d90322aec1"
    },
    "2": {
      "url": "https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=e45a502bdeae5a075257c4f061d1ff4ff0821354"
    },
    "A-32141528": {},
    "NIST-CVE-2016-5195": {
      "url": "https://nvd.nist.gov/vuln/data-feeds"
    },
    "Bulletin-CVE-2016-5195": {
      "url": "https://source.android.com/security/bulletin/2016-11-01.html"
    }
  },
  "Surface": [
    "local",
    "app"
  ],
  "Vector": [
    "concurrency-problem"
  ],
  "Target": [
    "kernel"
  ],
  "Channel": [
    "app-execution"
  ],
  "Condition": [
    "affected-app-installed"
  ],
  "Privilege": [
    "kernel"
  ],
  "CWE": [
    [
      "CWE-362",
      "NIST-CVE-2016-5195"
    ]
  ]
}