logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2016-5195

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2016-5195

Description:
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
Last updated date:
01/29/2025

Reports

alt

ACTIVELY EXPLOITED

Type:
exploitation
Confidence:
HIGH
Date of publishing:
10/18/2016
Reference url to background

https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails

Type:
exploitation
Confidence:
HIGH
Date of publishing:
02/17/2020
Type:
exploitation
Confidence:
HIGH
Date of publishing:
03/03/2022
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/21/2016
Reference url to background

https://github.com/timwr/CVE-2016-5195

Type:
exploit
Confidence:
HIGH
Date of publishing:
10/21/2016
Reference url to background

https://github.com/xlucas/dirtycow.cr

Type:
exploit
Confidence:
HIGH
Date of publishing:
10/22/2016
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/22/2016
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/22/2016
Reference url to background

https://github.com/scumjr/dirtycow-vdso

Type:
exploit
Confidence:
HIGH
Date of publishing:
10/23/2016
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/24/2016
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/29/2016
Reference url to background

https://github.com/aishee/scan-dirtycow

Type:
exploit
Confidence:
HIGH
Date of publishing:
10/29/2016
Type:
exploit
Confidence:
HIGH
Date of publishing:
11/17/2016
Type:
exploit
Confidence:
HIGH
Date of publishing:
11/25/2016
Reference url to background

https://github.com/firefart/dirtycow

Type:
exploit
Confidence:
HIGH
Date of publishing:
01/16/2017
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/20/2017
Reference url to background

https://github.com/hyln9/VIKIROOT

Type:
exploit
Confidence:
HIGH
Date of publishing:
03/18/2017
Type:
exploit
Confidence:
HIGH
Date of publishing:
05/27/2018
Reference url to background

https://github.com/Brucetg/DirtyCow-EXP

Type:
exploit
Confidence:
HIGH
Date of publishing:
08/13/2019
Reference url to background

https://github.com/jas502n/CVE-2016-5195

Type:
exploit
Confidence:
HIGH
Date of publishing:
10/22/2019
Reference url to background

https://github.com/imust6226/dirtcow

Type:
exploit
Confidence:
HIGH
Date of publishing:
06/26/2020
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/06/2021
Reference url to background

https://github.com/talsim/root-dirtyc0w

Type:
exploit
Confidence:
HIGH
Date of publishing:
03/07/2022
Reference url to background

https://github.com/imfiver/CVE-2022-0847

Type:
exploit
Confidence:
HIGH
Date of publishing:
03/07/2022
Reference url to background

https://github.com/r1is/CVE-2022-0847

Type:
exploit
Confidence:
HIGH
Date of publishing:
06/28/2022
Reference url to background

https://github.com/flux10n/dirtycow

Type:
exploit
Confidence:
HIGH
Date of publishing:
02/08/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/24/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/24/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/24/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/24/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/24/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/24/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/24/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/24/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/24/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/24/2024
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2025

Privacy Policy