LIVE NEWSROOM · --:-- · May 24, 2026
A LIBRARY FOR SECURITY RESEARCHERS

CVE DATABASE  /  CVE-2016-5195

CVE-2016-5195

Linux Kernel Race Condition Vulnerability

CVSS 7 · HIGH ⚠ CISA KEV — ACTIVELY EXPLOITED
On the CISA KEV catalog

Confirmed exploited in the wild. Added 2022-03-03. Federal remediation due 2022-03-24.
Required action: Apply updates per vendor instructions.

Summary

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

CVSS 3.1 breakdown

Base score7 (HIGH)
VectorCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack vectorLOCAL
Attack complexityHIGH
Privileges requiredLOW
User interactionNONE
ScopeUNCHANGED
ConfidentialityHIGH
IntegrityHIGH
AvailabilityHIGH

Weakness type (CWE)

Affected products

Canonical ubuntu linuxLinux linux kernelRedhat enterprise linuxRedhat enterprise linux ausRedhat enterprise linux eusRedhat enterprise linux long lifeRedhat enterprise linux tusDebian debian linuxFedoraproject fedoraPaloaltonetworks pan-osNetapp cloud backupNetapp hci storage nodesNetapp oncommand balanceNetapp oncommand performance managerNetapp oncommand unified manager for clustered data ontapNetapp ontap select deploy administration utilityNetapp snapprotectNetapp solidfire
Check this CVE live

Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.

Our coverage

References

Data: NIST NVD + CISA KEV. NVD last modified 2026-04-21. Always verify against the vendor advisory before acting.

Scroll to Top