{"uuid": "dbfa5839-295c-448a-9211-f73e16307d03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-5195", "type": "seen", "source": "https://t.me/itsecalert/46", "content": "\u26a0\ufe0f Linux -kernel-local-privilege-escalation-vulnerability-fix CVE-2016-5195: . A race condition was found in the way the Linux kernel\u2019s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (severity: \ud83d\udd38high) Further Info: http://mcaf.ee/xoyfqr\n#alert #vulnerability #severityhigh #linux #kernel #privilegeescalation #exploitednow\n\nPlease subscribe (and let your sysadmins subscribe) to our email alerts: https://infected.io/e-mail-it-security-alerts - just alerts, no spam.", "creation_timestamp": "2016-10-21T12:03:18.000000Z"}