gsd-2016-5195
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
Aliases
Aliases



{
   GSD: {
      alias: "CVE-2016-5195",
      description: "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
      id: "GSD-2016-5195",
      references: [
         "https://www.suse.com/security/cve/CVE-2016-5195.html",
         "https://www.debian.org/security/2016/dsa-3696",
         "https://access.redhat.com/errata/RHSA-2017:0372",
         "https://access.redhat.com/errata/RHSA-2016:2133",
         "https://access.redhat.com/errata/RHSA-2016:2132",
         "https://access.redhat.com/errata/RHSA-2016:2128",
         "https://access.redhat.com/errata/RHSA-2016:2127",
         "https://access.redhat.com/errata/RHSA-2016:2126",
         "https://access.redhat.com/errata/RHSA-2016:2124",
         "https://access.redhat.com/errata/RHSA-2016:2120",
         "https://access.redhat.com/errata/RHSA-2016:2118",
         "https://access.redhat.com/errata/RHSA-2016:2110",
         "https://access.redhat.com/errata/RHSA-2016:2107",
         "https://access.redhat.com/errata/RHSA-2016:2106",
         "https://access.redhat.com/errata/RHSA-2016:2105",
         "https://access.redhat.com/errata/RHSA-2016:2098",
         "https://ubuntu.com/security/CVE-2016-5195",
         "https://advisories.mageia.org/CVE-2016-5195.html",
         "https://security.archlinux.org/CVE-2016-5195",
         "https://alas.aws.amazon.com/cve/html/CVE-2016-5195.html",
         "https://linux.oracle.com/cve/CVE-2016-5195.html",
         "https://packetstormsecurity.com/files/cve/CVE-2016-5195",
      ],
   },
   gsd: {
      metadata: {
         exploitCode: "unknown",
         remediation: "unknown",
         reportConfidence: "confirmed",
         type: "vulnerability",
      },
      osvSchema: {
         aliases: [
            "CVE-2016-5195",
         ],
         details: "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
         id: "GSD-2016-5195",
         modified: "2023-12-13T01:21:25.620075Z",
         schema_version: "1.4.0",
      },
   },
   namespaces: {
      "cisa.gov": {
         cveID: "CVE-2016-5195",
         dateAdded: "2022-03-03",
         dueDate: "2022-03-24",
         product: "Kernel",
         requiredAction: "Apply updates per vendor instructions.",
         shortDescription: "Race condition in mm/gup.c in the Linux kernel allows local users to escalate privileges.",
         vendorProject: "Linux",
         vulnerabilityName: "Linux Kernel Race Condition Vulnerability",
      },
      "cve.org": {
         CVE_data_meta: {
            ASSIGNER: "chrome-cve-admin@google.com",
            ID: "CVE-2016-5195",
            STATE: "PUBLIC",
         },
         affects: {
            vendor: {
               vendor_data: [
                  {
                     product: {
                        product_data: [
                           {
                              product_name: "n/a",
                              version: {
                                 version_data: [
                                    {
                                       version_value: "n/a",
                                    },
                                 ],
                              },
                           },
                        ],
                     },
                     vendor_name: "n/a",
                  },
               ],
            },
         },
         data_format: "MITRE",
         data_type: "CVE",
         data_version: "4.0",
         description: {
            description_data: [
               {
                  lang: "eng",
                  value: "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
               },
            ],
         },
         problemtype: {
            problemtype_data: [
               {
                  description: [
                     {
                        lang: "eng",
                        value: "n/a",
                     },
                  ],
               },
            ],
         },
         references: {
            reference_data: [
               {
                  name: "RHSA-2016:2107",
                  refsource: "REDHAT",
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2107.html",
               },
               {
                  name: "40616",
                  refsource: "EXPLOIT-DB",
                  url: "https://www.exploit-db.com/exploits/40616/",
               },
               {
                  name: "RHSA-2017:0372",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2017:0372",
               },
               {
                  name: "https://bto.bluecoat.com/security-advisory/sa134",
                  refsource: "CONFIRM",
                  url: "https://bto.bluecoat.com/security-advisory/sa134",
               },
               {
                  name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241",
                  refsource: "CONFIRM",
                  url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241",
               },
               {
                  name: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                  refsource: "CONFIRM",
                  url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
               },
               {
                  name: "40839",
                  refsource: "EXPLOIT-DB",
                  url: "https://www.exploit-db.com/exploits/40839/",
               },
               {
                  name: "https://dirtycow.ninja",
                  refsource: "MISC",
                  url: "https://dirtycow.ninja",
               },
               {
                  name: "40847",
                  refsource: "EXPLOIT-DB",
                  url: "https://www.exploit-db.com/exploits/40847/",
               },
               {
                  name: "RHSA-2016:2118",
                  refsource: "REDHAT",
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2118.html",
               },
               {
                  name: "RHSA-2016:2128",
                  refsource: "REDHAT",
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2128.html",
               },
               {
                  name: "https://source.android.com/security/bulletin/2016-12-01.html",
                  refsource: "CONFIRM",
                  url: "https://source.android.com/security/bulletin/2016-12-01.html",
               },
               {
                  name: "RHSA-2016:2120",
                  refsource: "REDHAT",
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2120.html",
               },
               {
                  name: "[oss-security] 20161026 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
                  refsource: "MLIST",
                  url: "http://www.openwall.com/lists/oss-security/2016/10/26/7",
               },
               {
                  name: "RHSA-2016:2133",
                  refsource: "REDHAT",
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2133.html",
               },
               {
                  name: "RHSA-2016:2098",
                  refsource: "REDHAT",
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2098.html",
               },
               {
                  name: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03761en_us",
                  refsource: "CONFIRM",
                  url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03761en_us",
               },
               {
                  name: "VU#243144",
                  refsource: "CERT-VN",
                  url: "https://www.kb.cert.org/vuls/id/243144",
               },
               {
                  name: "https://bugzilla.suse.com/show_bug.cgi?id=1004418",
                  refsource: "CONFIRM",
                  url: "https://bugzilla.suse.com/show_bug.cgi?id=1004418",
               },
               {
                  name: "1037078",
                  refsource: "SECTRACK",
                  url: "http://www.securitytracker.com/id/1037078",
               },
               {
                  name: "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html",
                  refsource: "CONFIRM",
                  url: "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html",
               },
               {
                  name: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03722en_us",
                  refsource: "CONFIRM",
                  url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03722en_us",
               },
               {
                  name: "https://security.netapp.com/advisory/ntap-20161025-0001/",
                  refsource: "CONFIRM",
                  url: "https://security.netapp.com/advisory/ntap-20161025-0001/",
               },
               {
                  name: "93793",
                  refsource: "BID",
                  url: "http://www.securityfocus.com/bid/93793",
               },
               {
                  name: "RHSA-2016:2127",
                  refsource: "REDHAT",
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2127.html",
               },
               {
                  name: "https://security-tracker.debian.org/tracker/CVE-2016-5195",
                  refsource: "CONFIRM",
                  url: "https://security-tracker.debian.org/tracker/CVE-2016-5195",
               },
               {
                  name: "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs",
                  refsource: "MISC",
                  url: "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs",
               },
               {
                  name: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03742en_us",
                  refsource: "CONFIRM",
                  url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03742en_us",
               },
               {
                  name: "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
                  refsource: "CONFIRM",
                  url: "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
               },
               {
                  name: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
                  refsource: "CONFIRM",
                  url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
               },
               {
                  name: "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails",
                  refsource: "MISC",
                  url: "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails",
               },
               {
                  name: "https://bugzilla.redhat.com/show_bug.cgi?id=1384344",
                  refsource: "CONFIRM",
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=1384344",
               },
               {
                  name: "https://access.redhat.com/security/vulnerabilities/2706661",
                  refsource: "CONFIRM",
                  url: "https://access.redhat.com/security/vulnerabilities/2706661",
               },
               {
                  name: "RHSA-2016:2106",
                  refsource: "REDHAT",
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2106.html",
               },
               {
                  name: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
                  refsource: "CONFIRM",
                  url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
               },
               {
                  name: "40611",
                  refsource: "EXPLOIT-DB",
                  url: "https://www.exploit-db.com/exploits/40611/",
               },
               {
                  name: "https://access.redhat.com/security/cve/cve-2016-5195",
                  refsource: "CONFIRM",
                  url: "https://access.redhat.com/security/cve/cve-2016-5195",
               },
               {
                  name: "https://source.android.com/security/bulletin/2016-11-01.html",
                  refsource: "CONFIRM",
                  url: "https://source.android.com/security/bulletin/2016-11-01.html",
               },
               {
                  name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541",
                  refsource: "CONFIRM",
                  url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541",
               },
               {
                  name: "RHSA-2016:2124",
                  refsource: "REDHAT",
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2124.html",
               },
               {
                  name: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3",
                  refsource: "CONFIRM",
                  url: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3",
               },
               {
                  name: "RHSA-2016:2105",
                  refsource: "REDHAT",
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2105.html",
               },
               {
                  name: "RHSA-2016:2126",
                  refsource: "REDHAT",
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2126.html",
               },
               {
                  name: "RHSA-2016:2132",
                  refsource: "REDHAT",
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2132.html",
               },
               {
                  name: "RHSA-2016:2110",
                  refsource: "REDHAT",
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2110.html",
               },
               {
                  name: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03707en_us",
                  refsource: "CONFIRM",
                  url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03707en_us",
               },
               {
                  name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463",
                  refsource: "CONFIRM",
                  url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463",
               },
               {
                  name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10176",
                  refsource: "CONFIRM",
                  url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10176",
               },
               {
                  name: "SUSE-SU-2016:2635",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html",
               },
               {
                  name: "SUSE-SU-2016:2659",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html",
               },
               {
                  name: "[oss-security] 20161027 CVE-2016-5195 test case",
                  refsource: "MLIST",
                  url: "http://www.openwall.com/lists/oss-security/2016/10/27/13",
               },
               {
                  name: "USN-3106-2",
                  refsource: "UBUNTU",
                  url: "http://www.ubuntu.com/usn/USN-3106-2",
               },
               {
                  name: "openSUSE-SU-2016:2583",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html",
               },
               {
                  name: "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html",
                  refsource: "MISC",
                  url: "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html",
               },
               {
                  name: "SUSE-SU-2016:2633",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html",
               },
               {
                  name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en",
                  refsource: "CONFIRM",
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en",
               },
               {
                  name: "SUSE-SU-2016:2638",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html",
               },
               {
                  name: "openSUSE-SU-2016:2584",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html",
               },
               {
                  name: "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html",
                  refsource: "MISC",
                  url: "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html",
               },
               {
                  name: "SUSE-SU-2016:2658",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html",
               },
               {
                  name: "SUSE-SU-2016:2631",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html",
               },
               {
                  name: "USN-3106-3",
                  refsource: "UBUNTU",
                  url: "http://www.ubuntu.com/usn/USN-3106-3",
               },
               {
                  name: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241",
                  refsource: "CONFIRM",
                  url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241",
               },
               {
                  name: "SUSE-SU-2016:2655",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html",
               },
               {
                  name: "FEDORA-2016-c3558808cd",
                  refsource: "FEDORA",
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/",
               },
               {
                  name: "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
                  refsource: "BUGTRAQ",
                  url: "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded",
               },
               {
                  name: "SUSE-SU-2016:2637",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html",
               },
               {
                  name: "SUSE-SU-2016:2596",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html",
               },
               {
                  name: "SUSE-SU-2016:2634",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html",
               },
               {
                  name: "20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue",
                  refsource: "CISCO",
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd",
               },
               {
                  name: "20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016",
                  refsource: "CISCO",
                  url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux",
               },
               {
                  name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770",
                  refsource: "CONFIRM",
                  url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770",
               },
               {
                  name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10177",
                  refsource: "CONFIRM",
                  url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10177",
               },
               {
                  name: "SUSE-SU-2016:2657",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html",
               },
               {
                  name: "SUSE-SU-2016:2614",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html",
               },
               {
                  name: "USN-3105-2",
                  refsource: "UBUNTU",
                  url: "http://www.ubuntu.com/usn/USN-3105-2",
               },
               {
                  name: "USN-3107-1",
                  refsource: "UBUNTU",
                  url: "http://www.ubuntu.com/usn/USN-3107-1",
               },
               {
                  name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774",
                  refsource: "CONFIRM",
                  url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774",
               },
               {
                  name: "USN-3107-2",
                  refsource: "UBUNTU",
                  url: "http://www.ubuntu.com/usn/USN-3107-2",
               },
               {
                  name: "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
                  refsource: "BUGTRAQ",
                  url: "http://www.securityfocus.com/archive/1/540344/100/0/threaded",
               },
               {
                  name: "openSUSE-SU-2016:2625",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html",
               },
               {
                  name: "USN-3106-1",
                  refsource: "UBUNTU",
                  url: "http://www.ubuntu.com/usn/USN-3106-1",
               },
               {
                  name: "USN-3106-4",
                  refsource: "UBUNTU",
                  url: "http://www.ubuntu.com/usn/USN-3106-4",
               },
               {
                  name: "[oss-security] 20161030 Re: CVE-2016-5195 test case",
                  refsource: "MLIST",
                  url: "http://www.openwall.com/lists/oss-security/2016/10/30/1",
               },
               {
                  name: "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
                  refsource: "MISC",
                  url: "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
               },
               {
                  name: "SUSE-SU-2016:2673",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html",
               },
               {
                  name: "USN-3104-2",
                  refsource: "UBUNTU",
                  url: "http://www.ubuntu.com/usn/USN-3104-2",
               },
               {
                  name: "http://fortiguard.com/advisory/FG-IR-16-063",
                  refsource: "CONFIRM",
                  url: "http://fortiguard.com/advisory/FG-IR-16-063",
               },
               {
                  name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807",
                  refsource: "CONFIRM",
                  url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807",
               },
               {
                  name: "SUSE-SU-2016:2629",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html",
               },
               {
                  name: "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
                  refsource: "BUGTRAQ",
                  url: "http://www.securityfocus.com/archive/1/539611/100/0/threaded",
               },
               {
                  name: "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
                  refsource: "MISC",
                  url: "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
               },
               {
                  name: "SUSE-SU-2016:2632",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html",
               },
               {
                  name: "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
                  refsource: "BUGTRAQ",
                  url: "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded",
               },
               {
                  name: "USN-3105-1",
                  refsource: "UBUNTU",
                  url: "http://www.ubuntu.com/usn/USN-3105-1",
               },
               {
                  name: "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html",
                  refsource: "MISC",
                  url: "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html",
               },
               {
                  name: "SUSE-SU-2016:2630",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html",
               },
               {
                  name: "FEDORA-2016-db4b75b352",
                  refsource: "FEDORA",
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/",
               },
               {
                  name: "FEDORA-2016-c8a0c7eece",
                  refsource: "FEDORA",
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/",
               },
               {
                  name: "[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
                  refsource: "MLIST",
                  url: "http://www.openwall.com/lists/oss-security/2016/11/03/7",
               },
               {
                  name: "SUSE-SU-2016:2636",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html",
               },
               {
                  name: "SUSE-SU-2016:3069",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html",
               },
               {
                  name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10222",
                  refsource: "CONFIRM",
                  url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10222",
               },
               {
                  name: "DSA-3696",
                  refsource: "DEBIAN",
                  url: "http://www.debian.org/security/2016/dsa-3696",
               },
               {
                  name: "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html",
                  refsource: "MISC",
                  url: "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html",
               },
               {
                  name: "SUSE-SU-2016:2592",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html",
               },
               {
                  name: "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
                  refsource: "BUGTRAQ",
                  url: "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded",
               },
               {
                  name: "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
                  refsource: "BUGTRAQ",
                  url: "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded",
               },
               {
                  name: "USN-3104-1",
                  refsource: "UBUNTU",
                  url: "http://www.ubuntu.com/usn/USN-3104-1",
               },
               {
                  name: "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
                  refsource: "BUGTRAQ",
                  url: "http://www.securityfocus.com/archive/1/540736/100/0/threaded",
               },
               {
                  name: "SUSE-SU-2016:2593",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html",
               },
               {
                  name: "SUSE-SU-2016:3304",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html",
               },
               {
                  name: "[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
                  refsource: "MLIST",
                  url: "http://www.openwall.com/lists/oss-security/2016/10/21/1",
               },
               {
                  name: "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
                  refsource: "BUGTRAQ",
                  url: "http://www.securityfocus.com/archive/1/540252/100/0/threaded",
               },
               {
                  name: "SUSE-SU-2016:2585",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html",
               },
               {
                  name: "openSUSE-SU-2016:2649",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html",
               },
               {
                  name: "https://security.paloaltonetworks.com/CVE-2016-5195",
                  refsource: "CONFIRM",
                  url: "https://security.paloaltonetworks.com/CVE-2016-5195",
               },
               {
                  name: "openSUSE-SU-2020:0554",
                  refsource: "SUSE",
                  url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html",
               },
               {
                  name: "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026",
                  refsource: "MISC",
                  url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026",
               },
               {
                  name: "[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files",
                  refsource: "MLIST",
                  url: "http://www.openwall.com/lists/oss-security/2022/03/07/1",
               },
               {
                  name: "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
                  refsource: "MLIST",
                  url: "http://www.openwall.com/lists/oss-security/2022/08/08/2",
               },
               {
                  name: "[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
                  refsource: "MLIST",
                  url: "http://www.openwall.com/lists/oss-security/2022/08/08/1",
               },
               {
                  name: "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
                  refsource: "MLIST",
                  url: "http://www.openwall.com/lists/oss-security/2022/08/08/7",
               },
               {
                  name: "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
                  refsource: "MLIST",
                  url: "http://www.openwall.com/lists/oss-security/2022/08/08/8",
               },
               {
                  name: "[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
                  refsource: "MLIST",
                  url: "http://www.openwall.com/lists/oss-security/2022/08/09/4",
               },
               {
                  name: "[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
                  refsource: "MLIST",
                  url: "http://www.openwall.com/lists/oss-security/2022/08/15/1",
               },
            ],
         },
      },
      "nvd.nist.gov": {
         configurations: {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "3.4.113",
                        versionStartIncluding: "3.3",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "3.2.83",
                        versionStartIncluding: "2.6.22",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "3.10.104",
                        versionStartIncluding: "3.5",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "3.12.66",
                        versionStartIncluding: "3.11",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "3.16.38",
                        versionStartIncluding: "3.13",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "3.18.44",
                        versionStartIncluding: "3.17",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "4.1.35",
                        versionStartIncluding: "3.19",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "4.4.26",
                        versionStartIncluding: "4.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "4.7.9",
                        versionStartIncluding: "4.5",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "4.8.3",
                        versionStartIncluding: "4.8",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_tus:6.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_long_life:5.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_aus:6.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_long_life:5.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_aus:6.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
         cve: {
            CVE_data_meta: {
               ASSIGNER: "chrome-cve-admin@google.com",
               ID: "CVE-2016-5195",
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "en",
                     value: "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "en",
                           value: "CWE-362",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3",
                     refsource: "CONFIRM",
                     tags: [
                        "Release Notes",
                        "Vendor Advisory",
                     ],
                     url: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3",
                  },
                  {
                     name: "https://dirtycow.ninja",
                     refsource: "MISC",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://dirtycow.ninja",
                  },
                  {
                     name: "https://security-tracker.debian.org/tracker/CVE-2016-5195",
                     refsource: "CONFIRM",
                     tags: [
                        "Issue Tracking",
                        "Third Party Advisory",
                     ],
                     url: "https://security-tracker.debian.org/tracker/CVE-2016-5195",
                  },
                  {
                     name: "https://access.redhat.com/security/cve/cve-2016-5195",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://access.redhat.com/security/cve/cve-2016-5195",
                  },
                  {
                     name: "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails",
                     refsource: "MISC",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails",
                  },
                  {
                     name: "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html",
                  },
                  {
                     name: "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs",
                     refsource: "MISC",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs",
                  },
                  {
                     name: "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
                     refsource: "CONFIRM",
                     tags: [
                        "Issue Tracking",
                        "Patch",
                        "Third Party Advisory",
                     ],
                     url: "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
                  },
                  {
                     name: "https://bugzilla.suse.com/show_bug.cgi?id=1004418",
                     refsource: "CONFIRM",
                     tags: [
                        "Issue Tracking",
                        "Third Party Advisory",
                     ],
                     url: "https://bugzilla.suse.com/show_bug.cgi?id=1004418",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=1384344",
                     refsource: "CONFIRM",
                     tags: [
                        "Issue Tracking",
                        "Third Party Advisory",
                     ],
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=1384344",
                  },
                  {
                     name: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
                     refsource: "CONFIRM",
                     tags: [
                        "Issue Tracking",
                        "Patch",
                        "Vendor Advisory",
                     ],
                     url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
                  },
                  {
                     name: "[oss-security] 20161026 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
                     refsource: "MLIST",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://www.openwall.com/lists/oss-security/2016/10/26/7",
                  },
                  {
                     name: "https://access.redhat.com/security/vulnerabilities/2706661",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://access.redhat.com/security/vulnerabilities/2706661",
                  },
                  {
                     name: "VU#243144",
                     refsource: "CERT-VN",
                     tags: [
                        "Third Party Advisory",
                        "US Government Resource",
                     ],
                     url: "https://www.kb.cert.org/vuls/id/243144",
                  },
                  {
                     name: "93793",
                     refsource: "BID",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://www.securityfocus.com/bid/93793",
                  },
                  {
                     name: "https://source.android.com/security/bulletin/2016-11-01.html",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://source.android.com/security/bulletin/2016-11-01.html",
                  },
                  {
                     name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463",
                  },
                  {
                     name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541",
                  },
                  {
                     name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241",
                  },
                  {
                     name: "40847",
                     refsource: "EXPLOIT-DB",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "https://www.exploit-db.com/exploits/40847/",
                  },
                  {
                     name: "40839",
                     refsource: "EXPLOIT-DB",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "https://www.exploit-db.com/exploits/40839/",
                  },
                  {
                     name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10176",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10176",
                  },
                  {
                     name: "https://bto.bluecoat.com/security-advisory/sa134",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://bto.bluecoat.com/security-advisory/sa134",
                  },
                  {
                     name: "https://source.android.com/security/bulletin/2016-12-01.html",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://source.android.com/security/bulletin/2016-12-01.html",
                  },
                  {
                     name: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03722en_us",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03722en_us",
                  },
                  {
                     name: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03707en_us",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03707en_us",
                  },
                  {
                     name: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03742en_us",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03742en_us",
                  },
                  {
                     name: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03761en_us",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03761en_us",
                  },
                  {
                     name: "1037078",
                     refsource: "SECTRACK",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://www.securitytracker.com/id/1037078",
                  },
                  {
                     name: "40616",
                     refsource: "EXPLOIT-DB",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "https://www.exploit-db.com/exploits/40616/",
                  },
                  {
                     name: "40611",
                     refsource: "EXPLOIT-DB",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "https://www.exploit-db.com/exploits/40611/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20161025-0001/",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://security.netapp.com/advisory/ntap-20161025-0001/",
                  },
                  {
                     name: "RHSA-2017:0372",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://access.redhat.com/errata/RHSA-2017:0372",
                  },
                  {
                     name: "RHSA-2016:2133",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2133.html",
                  },
                  {
                     name: "RHSA-2016:2132",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2132.html",
                  },
                  {
                     name: "RHSA-2016:2128",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2128.html",
                  },
                  {
                     name: "RHSA-2016:2127",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2127.html",
                  },
                  {
                     name: "RHSA-2016:2126",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2126.html",
                  },
                  {
                     name: "RHSA-2016:2124",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2124.html",
                  },
                  {
                     name: "RHSA-2016:2120",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2120.html",
                  },
                  {
                     name: "RHSA-2016:2118",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2118.html",
                  },
                  {
                     name: "RHSA-2016:2110",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2110.html",
                  },
                  {
                     name: "RHSA-2016:2107",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2107.html",
                  },
                  {
                     name: "RHSA-2016:2106",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2106.html",
                  },
                  {
                     name: "RHSA-2016:2105",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2105.html",
                  },
                  {
                     name: "RHSA-2016:2098",
                     refsource: "REDHAT",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2098.html",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                     refsource: "CONFIRM",
                     tags: [
                        "Patch",
                        "Third Party Advisory",
                     ],
                     url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                  },
                  {
                     name: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
                  },
                  {
                     name: "https://security.paloaltonetworks.com/CVE-2016-5195",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://security.paloaltonetworks.com/CVE-2016-5195",
                  },
                  {
                     name: "openSUSE-SU-2020:0554",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html",
                  },
                  {
                     name: "openSUSE-SU-2016:2649",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html",
                  },
                  {
                     name: "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
                     refsource: "BUGTRAQ",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://www.securityfocus.com/archive/1/540344/100/0/threaded",
                  },
                  {
                     name: "DSA-3696",
                     refsource: "DEBIAN",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://www.debian.org/security/2016/dsa-3696",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html",
                     refsource: "MISC",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html",
                  },
                  {
                     name: "SUSE-SU-2016:3304",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html",
                  },
                  {
                     name: "http://fortiguard.com/advisory/FG-IR-16-063",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://fortiguard.com/advisory/FG-IR-16-063",
                  },
                  {
                     name: "SUSE-SU-2016:2657",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html",
                  },
                  {
                     name: "USN-3104-2",
                     refsource: "UBUNTU",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://www.ubuntu.com/usn/USN-3104-2",
                  },
                  {
                     name: "USN-3104-1",
                     refsource: "UBUNTU",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://www.ubuntu.com/usn/USN-3104-1",
                  },
                  {
                     name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10222",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10222",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html",
                     refsource: "MISC",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html",
                  },
                  {
                     name: "20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016",
                     refsource: "CISCO",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux",
                  },
                  {
                     name: "[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
                     refsource: "MLIST",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://www.openwall.com/lists/oss-security/2016/10/21/1",
                  },
                  {
                     name: "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
                     refsource: "BUGTRAQ",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded",
                  },
                  {
                     name: "SUSE-SU-2016:2658",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html",
                  },
                  {
                     name: "FEDORA-2016-c8a0c7eece",
                     refsource: "FEDORA",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/",
                  },
                  {
                     name: "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
                     refsource: "BUGTRAQ",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://www.securityfocus.com/archive/1/539611/100/0/threaded",
                  },
                  {
                     name: "SUSE-SU-2016:3069",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html",
                  },
                  {
                     name: "SUSE-SU-2016:2673",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html",
                  },
                  {
                     name: "FEDORA-2016-c3558808cd",
                     refsource: "FEDORA",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
                     refsource: "MISC",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
                  },
                  {
                     name: "SUSE-SU-2016:2633",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html",
                  },
                  {
                     name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10177",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10177",
                  },
                  {
                     name: "SUSE-SU-2016:2636",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html",
                  },
                  {
                     name: "20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue",
                     refsource: "CISCO",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html",
                     refsource: "MISC",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html",
                  },
                  {
                     name: "openSUSE-SU-2016:2583",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html",
                  },
                  {
                     name: "SUSE-SU-2016:2630",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html",
                  },
                  {
                     name: "USN-3105-1",
                     refsource: "UBUNTU",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://www.ubuntu.com/usn/USN-3105-1",
                  },
                  {
                     name: "USN-3105-2",
                     refsource: "UBUNTU",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://www.ubuntu.com/usn/USN-3105-2",
                  },
                  {
                     name: "SUSE-SU-2016:2634",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html",
                  },
                  {
                     name: "[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
                     refsource: "MLIST",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://www.openwall.com/lists/oss-security/2016/11/03/7",
                  },
                  {
                     name: "SUSE-SU-2016:2596",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html",
                     refsource: "MISC",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html",
                  },
                  {
                     name: "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
                     refsource: "BUGTRAQ",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://www.securityfocus.com/archive/1/540736/100/0/threaded",
                  },
                  {
                     name: "SUSE-SU-2016:2635",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html",
                  },
                  {
                     name: "SUSE-SU-2016:2585",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html",
                  },
                  {
                     name: "USN-3106-4",
                     refsource: "UBUNTU",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://www.ubuntu.com/usn/USN-3106-4",
                  },
                  {
                     name: "USN-3106-3",
                     refsource: "UBUNTU",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://www.ubuntu.com/usn/USN-3106-3",
                  },
                  {
                     name: "[oss-security] 20161030 Re: CVE-2016-5195 test case",
                     refsource: "MLIST",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://www.openwall.com/lists/oss-security/2016/10/30/1",
                  },
                  {
                     name: "SUSE-SU-2016:2592",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html",
                  },
                  {
                     name: "SUSE-SU-2016:2629",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html",
                  },
                  {
                     name: "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026",
                     refsource: "MISC",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026",
                  },
                  {
                     name: "USN-3106-2",
                     refsource: "UBUNTU",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://www.ubuntu.com/usn/USN-3106-2",
                  },
                  {
                     name: "USN-3106-1",
                     refsource: "UBUNTU",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://www.ubuntu.com/usn/USN-3106-1",
                  },
                  {
                     name: "SUSE-SU-2016:2637",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html",
                  },
                  {
                     name: "SUSE-SU-2016:2631",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html",
                  },
                  {
                     name: "openSUSE-SU-2016:2584",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html",
                  },
                  {
                     name: "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
                     refsource: "BUGTRAQ",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://www.securityfocus.com/archive/1/540252/100/0/threaded",
                  },
                  {
                     name: "openSUSE-SU-2016:2625",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
                     refsource: "MISC",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
                  },
                  {
                     name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807",
                  },
                  {
                     name: "FEDORA-2016-db4b75b352",
                     refsource: "FEDORA",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/",
                  },
                  {
                     name: "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
                     refsource: "BUGTRAQ",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded",
                  },
                  {
                     name: "SUSE-SU-2016:2632",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html",
                  },
                  {
                     name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774",
                  },
                  {
                     name: "SUSE-SU-2016:2593",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html",
                  },
                  {
                     name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770",
                  },
                  {
                     name: "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
                     refsource: "BUGTRAQ",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en",
                  },
                  {
                     name: "SUSE-SU-2016:2638",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html",
                  },
                  {
                     name: "SUSE-SU-2016:2659",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html",
                  },
                  {
                     name: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241",
                     refsource: "CONFIRM",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241",
                  },
                  {
                     name: "SUSE-SU-2016:2655",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html",
                  },
                  {
                     name: "USN-3107-2",
                     refsource: "UBUNTU",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://www.ubuntu.com/usn/USN-3107-2",
                  },
                  {
                     name: "SUSE-SU-2016:2614",
                     refsource: "SUSE",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html",
                  },
                  {
                     name: "[oss-security] 20161027 CVE-2016-5195 test case",
                     refsource: "MLIST",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://www.openwall.com/lists/oss-security/2016/10/27/13",
                  },
                  {
                     name: "USN-3107-1",
                     refsource: "UBUNTU",
                     tags: [
                        "Third Party Advisory",
                     ],
                     url: "http://www.ubuntu.com/usn/USN-3107-1",
                  },
                  {
                     name: "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
                     refsource: "BUGTRAQ",
                     tags: [
                        "Third Party Advisory",
                        "VDB Entry",
                     ],
                     url: "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded",
                  },
                  {
                     name: "[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files",
                     refsource: "MLIST",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://www.openwall.com/lists/oss-security/2022/03/07/1",
                  },
                  {
                     name: "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
                     refsource: "MLIST",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://www.openwall.com/lists/oss-security/2022/08/08/2",
                  },
                  {
                     name: "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
                     refsource: "MLIST",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://www.openwall.com/lists/oss-security/2022/08/08/7",
                  },
                  {
                     name: "[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
                     refsource: "MLIST",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://www.openwall.com/lists/oss-security/2022/08/08/1",
                  },
                  {
                     name: "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
                     refsource: "MLIST",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://www.openwall.com/lists/oss-security/2022/08/08/8",
                  },
                  {
                     name: "[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
                     refsource: "MLIST",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://www.openwall.com/lists/oss-security/2022/08/09/4",
                  },
                  {
                     name: "[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
                     refsource: "MLIST",
                     tags: [
                        "Mailing List",
                        "Third Party Advisory",
                     ],
                     url: "http://www.openwall.com/lists/oss-security/2022/08/15/1",
                  },
               ],
            },
         },
         impact: {
            baseMetricV2: {
               acInsufInfo: false,
               cvssV2: {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  integrityImpact: "COMPLETE",
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               exploitabilityScore: 3.9,
               impactScore: 10,
               obtainAllPrivilege: false,
               obtainOtherPrivilege: false,
               obtainUserPrivilege: false,
               severity: "HIGH",
               userInteractionRequired: false,
            },
            baseMetricV3: {
               cvssV3: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               exploitabilityScore: 1.8,
               impactScore: 5.9,
            },
         },
         lastModifiedDate: "2023-01-17T21:00Z",
         publishedDate: "2016-11-10T21:59Z",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.