Knowledge Library
Knowledge Library Home
Knowledge Library Home Knowledge Library Products Operating Systems Wind River Linux Wind River Linux 8 Security Notices Security Advisory - CVE-2016-5195 for linux kernel

Security Advisory - CVE-2016-5195 for linux kernel

Summary Security Advisory - CVE-2016-5195 for linux kernel
Product Version
Linux 8
Linux 7
Linux 6
Linux 5
Type Security Notices
Requirement Recommended
Release Date 10/24/2016
Downloads
Visibility
External
Contact
xzhang1

Description

Introduction
A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.

Details
https://cve.mitre.org/cgi-bin/cvenam...=CVE-2016-5195

Environment
Wind River Linux 5
Wind River Linux 6
Wind River Linux 7
Wind River Linux 8

Installation Notes

Installation for 5.0.1/6.0/7.0/8.0

1. Construct the linux kernel source tree in your build project
$ cd PATH_2_PROJ
$ /PATH_2_WRL_INSTALL/wrlinux/configure/ ...
$ make bbs
$ bitbake linux-windriver -c configure
$ exit

2. Install the kernel patch
$ make kds
$ git am CVE-2016-5195-WRL5[6,7,8].patch
$ exit

3. build linux kernel
$ make bbs
$ bitbake linux-windriver
$ exit

reproduce & verify
https://github.com/dirtycow/dirtycow...ter/dirtyc0w.c


Content ID: K-510610
 
Last modified