[security-announce] Security Update: linux-qoriq kernel CVE-2016-9754

Sona Sarmadi sona.sarmadi at enea.com
Fri Feb 3 11:34:24 CET 2017


	Enea Linux Security Advisory

====================================================================
Product/package: Enea Linux 6.0: (linux-qoriq kernel 3.12)
Severity: High
Architecture: PowerPC
CVE Name: CVE-2016-9754
====================================================================

This security update fixes integer overflow in linux-qoriq kernel 3.12
in Enea Linux 6.0.

Description
===========
The ring_buffer_resize function in kernel/trace/ring_buffer.c in the
profiling subsystem in the Linux kernel before 4.6.1 mishandles certain
integer calculations, which allows local users to gain privileges by
writing to the /sys/kernel/debug/tracing/buffer_size_kb file.

References
==========
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9754
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9754

Reference to upstream patch:
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/patch/?id=5feada97176f05f92088911fa807d30445c6a0c6


Correction for Enea Linux
=========================
http://git.enea.com/cgit/linux/meta-enea-bsp-ppc.git/patch/?id=5027488b26d6102220ca2444aa73c03c035f0277

How to get the latest patches
=============================
- If you have already cloned needed repositories, update it to get new
security patches.

cd Enea-Linux-6.0
$ repo sync

- If you have not yet cloned needed repositories, do it as described
below. (Security patches are fetched implicitly when cloning the repos).

Use repo tool to download the source for the Enea Linux 6.0 standard,
follow the steps below:
1. Make sure that the repo tool is installed. If not, follow the
instructions below:

$ curl https://storage.googleapis.com/git-repo-downloads/repo >
~/bin/repo $ chmod a+x ~/bin/repo

The instruction assumes that ~/bin exists and is included in the PATH
variable.

2.Use the repo tool to download the source:
$ mkdir Enea-Linux-6.0
$ cd Enea-Linux-6.0
$ repo init \
-u git://git.enea.com/linux/el_manifests-standard.git \ -b krogoth\ -m
<manifest file> $ repo sync

The parameter <manifest file> depends on the target:
P2041RDB: p2041rdb/default.xml
LS1021a-IoT: ls1021aiot/default.xml
QEMUARM: qemuarm/default.xml
QEMUPCC: qemuppc/default.xml
QEMUX86: qemux86/default.xml

If you have any questions regarding the security patches and security
updates please contact security at enea.com.

For gerneral security refer to Enea Linux Security page:
http://www.enea.com/solutions/Enea-Linux/Security/

For the CVEs fixed at Enea Linux releases see CVE list:
http://www.enea.com/solutions/Enea-Linux/Security/CVEs-list/

For custom packages/releases please use the Support Channel:
http://www.enea.com/solutions/support.

Enea Security Team
Sona Sarmadi
Mobile: +46 70 971 4475
www.enea.com





-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 473 bytes
Desc: OpenPGP digital signature
URL: <http://mail.lists.enea.com/pipermail/security-announce/attachments/20170203/6f414db9/attachment.sig>


More information about the security-announce mailing list