Race condition in mm/gup.c in the Linux kernel 2.x up to and including 4.x prior to 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
canonical ubuntu linux 16.10 |
||
canonical ubuntu linux 14.04 |
||
canonical ubuntu linux 16.04 |
||
canonical ubuntu linux 12.04 |
||
linux linux kernel |
||
redhat enterprise linux 7.0 |
||
redhat enterprise linux 6.0 |
||
redhat enterprise linux tus 6.5 |
||
redhat enterprise linux eus 6.7 |
||
redhat enterprise linux long life 5.6 |
||
redhat enterprise linux aus 6.4 |
||
redhat enterprise linux 5 |
||
redhat enterprise linux long life 5.9 |
||
redhat enterprise linux aus 6.2 |
||
redhat enterprise linux eus 7.1 |
||
redhat enterprise linux eus 6.6 |
||
redhat enterprise linux aus 6.5 |
||
debian debian linux 8.0 |
||
debian debian linux 7.0 |
These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. In 2019, Kaspersky mobile products and technologies detected: In summing up 2019, two trends in particular stick out: This report discusses each in more detail below, with examples and statistics. Over the past year, the number of attacks on the personal data of mobile device users increased by half: from 40,386 unique users in 2018 to 67,500 in 2019. This is not ...
For just under two years, the Global Research and Analysis Team (GReAT) at Kaspersky Lab has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They aim to highlight the significant events and findings that we feel people should be aware of. This is our latest installment, focusing on...
This time it's a 'Huge Dirty COW' and Linus Torvalds has cleaned up after it
Linus Torvalds last week rushed a patch into the Linux kernel, after researchers discovered the patch for 2016's Dirty COW bug had a bug of its own. Dirty COW is a privilege escalation vulnerability in Linux's “copy-on-write” mechanism, first documented in October 2016 and affecting both Linux and Android systems. As The Register wrote at the time, the problem means "programs can set up a race condition to tamper with what should be a read-only root-owned executable mapped into memory. The c...
Official bug notice? Sure, but not before I get cred and LOLs
More than three-quarters of vulnerabilities are publicly reported online before National Vulnerability Database publication. News sites, blogs and social media pages as well as more remote areas of the web including the dark web, paste sites, and criminal forums first published bugs more often than NIST's1 centralised National Vulnerability Database (NVD). "This disparity between the unofficial and official communication of CVEs is placing a greater onus on CISOs and security teams, leaving them...
Meanwhile, another nasty Linux bug surfaces
Google has posted an update for Android that, among other fixes, officially closes the Dirty COW vulnerability. The December 2016 update covers a total of 74 CVE-listed security vulnerabilities in Android devices. These fixes should be landing on Nexus handsets devices very soon, if not already, and installed as soon as possible; other devices should be getting the updates shortly, depending on how on-the-ball your manufacturer and cell network is – you may never, sadly, see the updates at all...
Widespread flaw can be easily exploited to hijack PCs, servers, gizmos, phones
Code dive Patch your Linux-powered systems, phones and gadgets as soon as possible, if you can, to kill off a kernel-level flaw affecting nearly every distro of the open-source operating system. Dubbed Dirty COW, the privilege-escalation vulnerability potentially allows any installed application, or malicious code smuggled onto a box, to gain root-level access and completely hijack the device. The programming bug gets its name from the copy-on-write mechanism in the Linux kernel; the implementat...