A security problem is identified with Linux Kernel.
⇑Read Here in Details: CVE-2016-5195
A race condition was found in the way the Linux kernel’s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible. Shipping versions of Fedora are affected and Fedora is aware of this flaw.
More details can be found on following url:
https://access.redhat.com/security/cve/CVE-2016-5195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5195
“Dirty COW” Linux kernel vulnerability, further analysis has revealed that this vulnerability can cause atacker to get root privillegs on Android devices.
Linux kernel higher than 2.6.22 are more prone to this vulnerability and many tool makers are already introducing tools capable to exploit this vulnerability.