CVE-2016-5195

KEV
Published: Nov 10, 2016 Last Modified: Nov 04, 2025
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,0
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH 7,2
Access Vector: local
Access Complexity: low
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete

Description

AI Translation Available

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka 'Dirty COW.'

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,9418
Percentile
1,0th
Updated

EPSS Score Trend (Last 91 Days)

362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Draft
Common Consequences
Security Scopes Affected:
Availability Confidentiality Integrity Access Control
Potential Impacts:
Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Dos: Resource Consumption (Other) Dos: Crash, Exit, Or Restart Dos: Instability Read Files Or Directories Read Application Data Execute Unauthorized Code Or Commands Gain Privileges Or Assume Identity Bypass Protection Mechanism
Applicable Platforms
Languages: C, C++, Java
Technologies: Mobile, ICS/OT
View CWE Details
Exploit

Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' …

Verified

Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' /proc/self/mem Race Condition (Write Access Method)

View Exploit Code →
Exploit

Linux Kernel 2.6.22 < 3.9 (x86/x64) - 'Dirty …

Verified

Linux Kernel 2.6.22 < 3.9 (x86/x64) - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (SUID Method)

View Exploit Code →
Exploit

Linux Kernel 2.6.22 < 3.9 - 'Dirty COW …

Linux Kernel 2.6.22 < 3.9 - 'Dirty COW PTRACE_POKEDATA' Race Condition (Write Access Method)

View Exploit Code →
Exploit

Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' …

Verified

Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' 'PTRACE_POKEDATA' Race Condition Privilege Escalation (/etc/passwd Method)

View Exploit Code →
Exploit

Linux Kernel 2.6.22 < 3.9 - 'Dirty COW …

Verified

Linux Kernel 2.6.22 < 3.9 - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (/etc/passwd Method)

View Exploit Code →
Operating System

Linux Kernel by Linux

Version Range Affected
From 4.8 (inclusive)
To 4.8.3 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux by Redhat

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 3.11 (inclusive)
To 3.12.66 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Oncommand Performance Manager by Netapp

cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Pan-Os by Paloaltonetworks

Version Range Affected
From 7.1.0 (inclusive)
To 7.1.8 (exclusive)
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux by Redhat

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux Eus by Redhat

cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Oncommand Unified Manager For Clustered Data Ontap by Netapp

cpe:2.3:a:netapp:oncommand_unified_manager_for_clustered_data_ontap:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux Aus by Redhat

cpe:2.3:o:redhat:enterprise_linux_aus:6.4:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Cloud Backup by Netapp

cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux Long Life by Redhat

cpe:2.3:o:redhat:enterprise_linux_long_life:5.9:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 2.6.22 (inclusive)
To 3.2.83 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 4.5 (inclusive)
To 4.7.9 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Fedora by Fedoraproject

cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux Aus by Redhat

cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Oncommand Balance by Netapp

cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux Tus by Redhat

cpe:2.3:o:redhat:enterprise_linux_tus:6.5:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux Long Life by Redhat

cpe:2.3:o:redhat:enterprise_linux_long_life:5.6:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Hci Storage Nodes by Netapp

cpe:2.3:a:netapp:hci_storage_nodes:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 3.13 (inclusive)
To 3.16.38 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 4.2 (inclusive)
To 4.4.26 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux Eus by Redhat

cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 3.19 (inclusive)
To 4.1.35 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 3.3 (inclusive)
To 3.4.113 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux Eus by Redhat

cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Solidfire by Netapp

cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux by Redhat

cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 3.5 (inclusive)
To 3.10.104 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Fedora by Fedoraproject

cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux Aus by Redhat

cpe:2.3:o:redhat:enterprise_linux_aus:6.2:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Fedora by Fedoraproject

cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Ontap Select Deploy Administration Utility by Netapp

cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Pan-Os by Paloaltonetworks

Version Range Affected
From 5.1 (inclusive)
To 7.0.14 (exclusive)
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 3.17 (inclusive)
To 3.18.44 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Snapprotect by Netapp

cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016…
http://fortiguard.com/advisory/FG-IR-16-063
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0…
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html
http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-L…
http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Conditio…
http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concep…
http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKED…
http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKED…
http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-L…
http://rhn.redhat.com/errata/RHSA-2016-2098.html
http://rhn.redhat.com/errata/RHSA-2016-2105.html
http://rhn.redhat.com/errata/RHSA-2016-2106.html
http://rhn.redhat.com/errata/RHSA-2016-2107.html
http://rhn.redhat.com/errata/RHSA-2016-2110.html
http://rhn.redhat.com/errata/RHSA-2016-2118.html
http://rhn.redhat.com/errata/RHSA-2016-2120.html
http://rhn.redhat.com/errata/RHSA-2016-2124.html
http://rhn.redhat.com/errata/RHSA-2016-2126.html
http://rhn.redhat.com/errata/RHSA-2016-2127.html
http://rhn.redhat.com/errata/RHSA-2016-2128.html
http://rhn.redhat.com/errata/RHSA-2016-2132.html
http://rhn.redhat.com/errata/RHSA-2016-2133.html
https://access.redhat.com/errata/RHSA-2017:0372
https://access.redhat.com/security/cve/cve-2016-5195
https://access.redhat.com/security/vulnerabilities/2706661
https://bto.bluecoat.com/security-advisory/sa134
https://bugzilla.redhat.com/show_bug.cgi?id=1384344
https://bugzilla.suse.com/show_bug.cgi?id=1004418
https://dirtycow.ninja
http://seclists.org/fulldisclosure/2024/Aug/35
https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs
https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e6…
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-…
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-…
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-…
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+…
https://kc.mcafee.com/corporate/index?page=content&id=SB10176
https://kc.mcafee.com/corporate/index?page=content&id=SB10177
https://kc.mcafee.com/corporate/index?page=content&id=SB10222
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html
https://security.netapp.com/advisory/ntap-20161025-0001/
https://security.paloaltonetworks.com/CVE-2016-5195
https://security-tracker.debian.org/tracker/CVE-2016-5195
https://source.android.com/security/bulletin/2016-11-01.html
https://source.android.com/security/bulletin/2016-12-01.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-…
https://www.arista.com/en/support/advisories-notices/security-advisories/1753-s…
https://www.exploit-db.com/exploits/40611/
https://www.exploit-db.com/exploits/40616/
https://www.exploit-db.com/exploits/40839/
https://www.exploit-db.com/exploits/40847/
https://www.kb.cert.org/vuls/id/243144
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2…
http://www.debian.org/security/2016/dsa-3696
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtyc…
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3
http://www.openwall.com/lists/oss-security/2016/10/21/1
http://www.openwall.com/lists/oss-security/2016/10/26/7
http://www.openwall.com/lists/oss-security/2016/10/27/13
http://www.openwall.com/lists/oss-security/2016/10/30/1
http://www.openwall.com/lists/oss-security/2016/11/03/7
http://www.openwall.com/lists/oss-security/2022/03/07/1
http://www.openwall.com/lists/oss-security/2022/08/08/1
http://www.openwall.com/lists/oss-security/2022/08/08/2
http://www.openwall.com/lists/oss-security/2022/08/08/7
http://www.openwall.com/lists/oss-security/2022/08/08/8
http://www.openwall.com/lists/oss-security/2022/08/09/4
http://www.openwall.com/lists/oss-security/2022/08/15/1
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/archive/1/539611/100/0/threaded
http://www.securityfocus.com/archive/1/540252/100/0/threaded
http://www.securityfocus.com/archive/1/540344/100/0/threaded
http://www.securityfocus.com/archive/1/540736/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded
http://www.securityfocus.com/bid/93793
http://www.securitytracker.com/id/1037078
http://www.ubuntu.com/usn/USN-3104-1
http://www.ubuntu.com/usn/USN-3104-2
http://www.ubuntu.com/usn/USN-3105-1
http://www.ubuntu.com/usn/USN-3105-2
http://www.ubuntu.com/usn/USN-3106-1
http://www.ubuntu.com/usn/USN-3106-2
http://www.ubuntu.com/usn/USN-3106-3
http://www.ubuntu.com/usn/USN-3106-4
http://www.ubuntu.com/usn/USN-3107-1
http://www.ubuntu.com/usn/USN-3107-2
http://fortiguard.com/advisory/FG-IR-16-063
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0…
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html
http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-L…
http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Conditio…
http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concep…
http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKED…
http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKED…
http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-L…
http://rhn.redhat.com/errata/RHSA-2016-2098.html
http://rhn.redhat.com/errata/RHSA-2016-2105.html
http://rhn.redhat.com/errata/RHSA-2016-2106.html
http://rhn.redhat.com/errata/RHSA-2016-2107.html
http://rhn.redhat.com/errata/RHSA-2016-2110.html
http://rhn.redhat.com/errata/RHSA-2016-2118.html
http://rhn.redhat.com/errata/RHSA-2016-2120.html
http://rhn.redhat.com/errata/RHSA-2016-2124.html
http://rhn.redhat.com/errata/RHSA-2016-2126.html
http://rhn.redhat.com/errata/RHSA-2016-2127.html
http://rhn.redhat.com/errata/RHSA-2016-2128.html
http://rhn.redhat.com/errata/RHSA-2016-2132.html
http://rhn.redhat.com/errata/RHSA-2016-2133.html
https://access.redhat.com/errata/RHSA-2017:0372
https://access.redhat.com/security/cve/cve-2016-5195
https://access.redhat.com/security/vulnerabilities/2706661
https://bto.bluecoat.com/security-advisory/sa134
https://bugzilla.redhat.com/show_bug.cgi?id=1384344
https://bugzilla.suse.com/show_bug.cgi?id=1004418
https://dirtycow.ninja
https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs
https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e6…
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-…
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-…
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-…
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+…
https://kc.mcafee.com/corporate/index?page=content&id=SB10176
https://kc.mcafee.com/corporate/index?page=content&id=SB10177
https://kc.mcafee.com/corporate/index?page=content&id=SB10222
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html
https://security.netapp.com/advisory/ntap-20161025-0001/
https://security.paloaltonetworks.com/CVE-2016-5195
https://security-tracker.debian.org/tracker/CVE-2016-5195
https://source.android.com/security/bulletin/2016-11-01.html
https://source.android.com/security/bulletin/2016-12-01.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-…
https://www.arista.com/en/support/advisories-notices/security-advisories/1753-s…
https://www.exploit-db.com/exploits/40611/
https://www.exploit-db.com/exploits/40616/
https://www.exploit-db.com/exploits/40839/
https://www.exploit-db.com/exploits/40847/
https://www.kb.cert.org/vuls/id/243144
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2…
http://www.debian.org/security/2016/dsa-3696
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtyc…
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3
http://www.openwall.com/lists/oss-security/2016/10/21/1
http://www.openwall.com/lists/oss-security/2016/10/26/7
http://www.openwall.com/lists/oss-security/2016/10/27/13
http://www.openwall.com/lists/oss-security/2016/10/30/1
http://www.openwall.com/lists/oss-security/2016/11/03/7
http://www.openwall.com/lists/oss-security/2022/03/07/1
http://www.openwall.com/lists/oss-security/2022/08/08/1
http://www.openwall.com/lists/oss-security/2022/08/08/2
http://www.openwall.com/lists/oss-security/2022/08/08/7
http://www.openwall.com/lists/oss-security/2022/08/08/8
http://www.openwall.com/lists/oss-security/2022/08/09/4
http://www.openwall.com/lists/oss-security/2022/08/15/1
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/archive/1/539611/100/0/threaded
http://www.securityfocus.com/archive/1/540252/100/0/threaded
http://www.securityfocus.com/archive/1/540344/100/0/threaded
http://www.securityfocus.com/archive/1/540736/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded
http://www.securityfocus.com/bid/93793
http://www.securitytracker.com/id/1037078
http://www.ubuntu.com/usn/USN-3104-1
http://www.ubuntu.com/usn/USN-3104-2
http://www.ubuntu.com/usn/USN-3105-1
http://www.ubuntu.com/usn/USN-3105-2
http://www.ubuntu.com/usn/USN-3106-1
http://www.ubuntu.com/usn/USN-3106-2
http://www.ubuntu.com/usn/USN-3106-3
http://www.ubuntu.com/usn/USN-3106-4
http://www.ubuntu.com/usn/USN-3107-1
http://www.ubuntu.com/usn/USN-3107-2