summaryrefslogtreecommitdiffstats
path: root/recipes-kernel/linux/linux-cavium_4.9.inc
Commit message (Collapse)AuthorAgeFilesLines
* linux-cavium: build USB network drivers as kernel modulespyro-nfvaccessfeature_arm64Adrian Calianu2017-12-081-0/+1
| | | | | | | We need USB ETH dongle support for board management. Signed-off-by: Adrian Calianu <adrian.calianu@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
* linux-cavium: CVE-2017-11176Sona Sarmadi2017-11-141-0/+1
| | | | | | | | | | fix a use-after-free in sys_mq_notify() Reference: https://nvd.nist.gov/vuln/detail/CVE-2017-11176 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
* openvswitch: fixed kernel crashDragos Motrea2017-11-031-0/+1
| | | | | Signed-off-by: Dragos Motrea <Dragos.Motrea@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
* linux-cavium: CVE-2017-8831Sona Sarmadi2017-10-021-0/+1
| | | | | | | | | | Double fetch vulnerability in saa7164_bus_get function Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-8831 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: CVE-2017-8062Sona Sarmadi2017-10-021-0/+1
| | | | | | | | | | w2102.c interacts incorrectly with the CONFIG_VMAP_STACK option Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-8062 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: CVE-2017-6353Sona Sarmadi2017-10-021-0/+1
| | | | | | | | | | Possible double free in stcp_sendmsg() (incorrect fix for CVE-2017-5986) Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-6353 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: CVE-2017-6348Sona Sarmadi2017-10-021-0/+1
| | | | | | | | | | net: Improper lock dropping in the hashbin_delete function Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-6348 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: CVE-2017-6345Sona Sarmadi2017-10-021-0/+1
| | | | | | | | | | llc: skb->sk set without skb->destructor Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-6345 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: CVE-2017-6214Sona Sarmadi2017-10-021-0/+1
| | | | | | | | | | ipv4/tcp: Infinite loop in tcp_splice_read() Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-6214 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: CVE-2017-5986Sona Sarmadi2017-09-291-0/+1
| | | | | | | | | | Reachable BUG_ON from userspace in sctp_wait_for_sndbuf Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-5986 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
* linux-cavium: CVE-2017-5970Sona Sarmadi2017-09-291-0/+1
| | | | | | | | | | ipv4: Invalid IP options could cause skb->dst drop Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-5970 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
* linux-cavium: CVE-2017-5669Sona Sarmadi2017-09-291-0/+1
| | | | | | | | | | Shmat allows mmap null page protection bypass Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-5669 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
* linux-cavium: CVE-2017-5577Sona Sarmadi2017-09-291-0/+1
| | | | | | | | | | vc4: Heap-buffer overflow due to failing checks Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-5577 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
* linux-cavium: CVE-2017-5551Sona Sarmadi2017-09-291-0/+1
| | | | | | | | | | S_ISGD is not cleared when setting posix ACLs in tmpfs (CVE-2016-7097 incomplete fix) Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-5551 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
* linux-cavium: CVE-2016-10208Sona Sarmadi2017-09-291-0/+1
| | | | | | | | | | EXT4 memory corruption / SLAB out-of-bounds read Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-10208 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
* linux-cavium: CVE-2016-10154Sona Sarmadi2017-09-291-3/+4
| | | | | | | | | | smbencrypt() points a scatterlist to the stack causing DoS Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-10154 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
* linux-cavium: CVE-2017-7645Sona Sarmadi2017-09-261-0/+1
| | | | | | | | | | nfsd: Incorrect handling of long RPC replies Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
* linux-cavium: CVE-2017-7618Sona Sarmadi2017-09-261-0/+1
| | | | | | | | | | Infinite recursion in ahash.c by triggering EBUSY on a full queue Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7618 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
* linux-cavium: CVE-2017-8069Sona Sarmadi2017-09-221-0/+1
| | | | | | | | | | rtl8150.c interacts incorrectly with the CONFIG_VMAP_STACK option Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8069 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: CVE-2017-8068Sona Sarmadi2017-09-221-0/+1
| | | | | | | | | | pegasus.c interacts incorrectly with the CONFIG_VMAP_STACK option Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8068 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: CVE-2017-8067Sona Sarmadi2017-09-221-0/+1
| | | | | | | | | | virtio_console.c interacts incorrectly with the CONFIG_VMAP_STACK option Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8067 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: CVE-2017-8066Sona Sarmadi2017-09-221-0/+1
| | | | | | | | | | gs_usb.c interacts incorrectly with the CONFIG_VMAP_STACK option Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8066 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: CVE-2017-8064Sona Sarmadi2017-09-221-0/+1
| | | | | | | | | | dvb_usb_core.c interacts incorrectly with the CONFIG_VMAP_STACK option Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: CVE-2017-8063Sona Sarmadi2017-09-221-0/+1
| | | | | | | | | | kernel: cxusb.c interacts incorrectly with the CONFIG_VMAP_STACK option Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8063 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: CVE-2017-1000364Sona Sarmadi2017-09-221-0/+1
| | | | | | | | | | | | | | | | | | Fixes an issue in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier. References: https://nvd.nist.gov/vuln/detail/CVE-2017-1000364 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-1000364 https://blogs.oracle.com/wim/cve-2017-1000364 Upstream patch https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?h=v4.9.50&id=cfc0eb403816c5c4f9667d959de5e22789b5421e Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: CVE-2017-7487Sona Sarmadi2017-09-221-0/+1
| | | | | | | | | | | | | call ipxitf_put() in ioctl error path References: https://nvd.nist.gov/vuln/detail/CVE-2017-7487 Upstream patch https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?h=v4.9.50&id=820adccd0e3be9bdd2384ca8fc4712108cfdf28b Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* linux-cavium: upgrade to SDK 6.1.0_p3Adrian Calianu2017-09-201-3/+3
| | | | | Signed-off-by: Adrian Calianu <adrian.calianu@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
* add separate kernel recipe for guestAdrian Calianu2017-09-071-0/+37
guest kernel is based on cavium kernel source tree as the one for host but we need a seprate recipe so we can append different kernel configurations for guest. Signed-off-by: Adrian Calianu <adrian.calianu@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>