diff options
author | Nathan Zadoks <nathan@nathan7.eu> | 2016-01-20 02:19:16 +0100 |
---|---|---|
committer | Vladimír Čunát <vcunat@gmail.com> | 2016-01-20 09:31:53 +0100 |
commit | 23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa (patch) | |
tree | 10f25dfa0195b19e667a120a0c896e57f9beb2b7 /pkgs/os-specific/linux/kernel/linux-4.1.nix | |
parent | f1f2b87fdd64c08c7b8625ffcdefa5fa7628e735 (diff) | |
download | nixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.tar nixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.tar.gz nixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.tar.bz2 nixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.tar.lz nixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.tar.xz nixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.tar.zst nixlib-23f5e3c90fb4a28a25f7a5dd41b8cf7b9fc4d6fa.zip |
linux: patch CVE-2016-0728 (close #12492)
The PoC provided successfully escalates privileges from a local user to root. The vulnerability affects any Linux Kernel version 3.8 and higher. http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
Diffstat (limited to 'pkgs/os-specific/linux/kernel/linux-4.1.nix')
-rw-r--r-- | pkgs/os-specific/linux/kernel/linux-4.1.nix | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/pkgs/os-specific/linux/kernel/linux-4.1.nix b/pkgs/os-specific/linux/kernel/linux-4.1.nix index d9efce840fab..29d4870597a3 100644 --- a/pkgs/os-specific/linux/kernel/linux-4.1.nix +++ b/pkgs/os-specific/linux/kernel/linux-4.1.nix @@ -9,6 +9,8 @@ import ./generic.nix (args // rec { sha256 = "18sr0dl5ax6pcx6nqp9drb4l6a38g07vxihiqpbwb231jv68h8j7"; }; + kernelPatches = args.kernelPatches ++ [ { name = "cve-2016-0728"; patch = ./cve-2016-0728.patch; } ]; + features.iwlwifi = true; features.efiBootStub = true; features.needsCifsUtils = true; |