File tree Expand file tree Collapse file tree 1 file changed +7
-0
lines changed Expand file tree Collapse file tree 1 file changed +7
-0
lines changed Original file line number Diff line number Diff line change @@ -89,3 +89,10 @@ Bugs *not* mitigated:
89
89
the kernel's non-maskable interrupt handling allowed privilege escalation.
90
90
Can be exploited in Docker containers because the ` modify_ldt() ` system call is
91
91
not currently blocked using seccomp.
92
+ * [ CVE-2016 -5195] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195 ) :
93
+ A race condition was found in the way the Linux kernel's memory subsystem
94
+ handled the copy-on-write (COW) breakage of private read-only memory mappings,
95
+ which allowed unprivileged local users to gain write access to read-only memory.
96
+ Also known as "dirty COW."
97
+ * Partial mitigations:* on some operating systems this vulnerability is mitigated
98
+ by the combination of seccomp filtering of ` ptrace ` and the fact that ` /proc/self/mem ` is read-only.
You can’t perform that action at this time.
0 commit comments