summary refs log tree commit diff
path: root/pkgs/os-specific/linux/kernel/linux-4.1.nix
diff options
context:
space:
mode:
authorNathan Zadoks <nathan@nathan7.eu>2016-01-20 02:19:16 +0100
committerVladimír Čunát <vcunat@gmail.com>2016-01-20 09:31:53 +0100
commit23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa (patch)
tree10f25dfa0195b19e667a120a0c896e57f9beb2b7 /pkgs/os-specific/linux/kernel/linux-4.1.nix
parentf1f2b87fdd64c08c7b8625ffcdefa5fa7628e735 (diff)
downloadnixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.tar
nixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.tar.gz
nixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.tar.bz2
nixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.tar.lz
nixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.tar.xz
nixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.tar.zst
nixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.zip
linux: patch CVE-2016-0728 (close #12492)
The PoC provided successfully escalates privileges from a local user to
root. The vulnerability affects any Linux Kernel version 3.8 and higher.
http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
Diffstat (limited to 'pkgs/os-specific/linux/kernel/linux-4.1.nix')
-rw-r--r--pkgs/os-specific/linux/kernel/linux-4.1.nix2
1 files changed, 2 insertions, 0 deletions
diff --git a/pkgs/os-specific/linux/kernel/linux-4.1.nix b/pkgs/os-specific/linux/kernel/linux-4.1.nix
index d9efce840fab..29d4870597a3 100644
--- a/pkgs/os-specific/linux/kernel/linux-4.1.nix
+++ b/pkgs/os-specific/linux/kernel/linux-4.1.nix
@@ -9,6 +9,8 @@ import ./generic.nix (args // rec {
     sha256 = "18sr0dl5ax6pcx6nqp9drb4l6a38g07vxihiqpbwb231jv68h8j7";
   };
 
+  kernelPatches = args.kernelPatches ++ [ { name = "cve-2016-0728"; patch = ./cve-2016-0728.patch; } ];
+
   features.iwlwifi = true;
   features.efiBootStub = true;
   features.needsCifsUtils = true;