From 2f4b09240cd24148f138654eeafdeac9a2f08e47 Mon Sep 17 00:00:00 2001 From: Adrian Dudau Date: Tue, 22 Nov 2016 15:18:11 +0100 Subject: linux-yocto: Drop patches obsoleted by v4.4.26 Yocto upgraded kernel version to 4.4.26, which includes the CVE fixes maintained here. Signed-off-by: Adrian Dudau Signed-off-by: Martin Borg --- recipes-kernel/linux/files/CVE-2016-5400.patch | 57 -------------------------- 1 file changed, 57 deletions(-) delete mode 100644 recipes-kernel/linux/files/CVE-2016-5400.patch (limited to 'recipes-kernel/linux/files/CVE-2016-5400.patch') diff --git a/recipes-kernel/linux/files/CVE-2016-5400.patch b/recipes-kernel/linux/files/CVE-2016-5400.patch deleted file mode 100644 index dd62bcd..0000000 --- a/recipes-kernel/linux/files/CVE-2016-5400.patch +++ /dev/null @@ -1,57 +0,0 @@ -From d863bec646a590584eabcb40550bff0708c26b0d Mon Sep 17 00:00:00 2001 -From: James Patrick-Evans -Date: Fri, 15 Jul 2016 16:40:45 +0100 -Subject: media: fix airspy usb probe error path - -commit aa93d1fee85c890a34f2510a310e55ee76a27848 upstream. - -Fix a memory leak on probe error of the airspy usb device driver. - -The problem is triggered when more than 64 usb devices register with -v4l2 of type VFL_TYPE_SDR or VFL_TYPE_SUBDEV. - -The memory leak is caused by the probe function of the airspy driver -mishandeling errors and not freeing the corresponding control structures -when an error occours registering the device to v4l2 core. - -A badusb device can emulate 64 of these devices, and then through -continual emulated connect/disconnect of the 65th device, cause the -kernel to run out of RAM and crash the kernel, thus causing a local DOS -vulnerability. - -Fixes CVE-2016-5400 -CVE: CVE-2016-5400 - -Signed-off-by: James Patrick-Evans -Reviewed-by: Kees Cook -Signed-off-by: Linus Torvalds -Signed-off-by: Greg Kroah-Hartman -Signed-off-by: Sona Sarmadi ---- - drivers/media/usb/airspy/airspy.c | 3 +-- - 1 file changed, 1 insertion(+), 2 deletions(-) - -diff --git a/drivers/media/usb/airspy/airspy.c b/drivers/media/usb/airspy/airspy.c -index 565a593..34b35eb 100644 ---- a/drivers/media/usb/airspy/airspy.c -+++ b/drivers/media/usb/airspy/airspy.c -@@ -1073,7 +1073,7 @@ static int airspy_probe(struct usb_interface *intf, - if (ret) { - dev_err(s->dev, "Failed to register as video device (%d)\n", - ret); -- goto err_unregister_v4l2_dev; -+ goto err_free_controls; - } - dev_info(s->dev, "Registered as %s\n", - video_device_node_name(&s->vdev)); -@@ -1082,7 +1082,6 @@ static int airspy_probe(struct usb_interface *intf, - - err_free_controls: - v4l2_ctrl_handler_free(&s->hdl); --err_unregister_v4l2_dev: - v4l2_device_unregister(&s->v4l2_dev); - err_free_mem: - kfree(s); --- -cgit v0.12 - -- cgit v1.2.3-54-g00ecf