summaryrefslogtreecommitdiffstats
path: root/recipes-kernel/linux/linux-intel.inc
diff options
context:
space:
mode:
authorSona Sarmadi <sona.sarmadi@enea.com>2017-11-16 09:38:47 +0100
committerAdrian Dudau <adrian.dudau@enea.com>2017-11-16 12:00:54 +0100
commit63e1243bb63d15cbf58cafa7caab00599ed8f46c (patch)
tree6ce141ad9d3ba5712fac9b6de3f9b5fdc885a261 /recipes-kernel/linux/linux-intel.inc
parentcf3664b57f0dc010c27bce1103c89c22dc359641 (diff)
downloadmeta-enea-bsp-x86-63e1243bb63d15cbf58cafa7caab00599ed8f46c.tar.gz
linu-intel: CVE-2017-1000364pyro
Fixes an issue in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier. References: https://nvd.nist.gov/vuln/detail/CVE-2017-1000364 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-1000364 https://blogs.oracle.com/wim/cve-2017-1000364 Upstream patch https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?h=v4.9.50&id=cfc0eb403816c5c4f9667d959de5e22789b5421e Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
Diffstat (limited to 'recipes-kernel/linux/linux-intel.inc')
-rw-r--r--recipes-kernel/linux/linux-intel.inc1
1 files changed, 1 insertions, 0 deletions
diff --git a/recipes-kernel/linux/linux-intel.inc b/recipes-kernel/linux/linux-intel.inc
index 84fbf77..c335a57 100644
--- a/recipes-kernel/linux/linux-intel.inc
+++ b/recipes-kernel/linux/linux-intel.inc
@@ -6,6 +6,7 @@ SRCREV_metaenea = "7579efbdb49529f36652b69d4630c6c43907f77b"
6KENEABRANCH = "intel-4.9" 6KENEABRANCH = "intel-4.9"
7SRC_URI_append = " git://git@git.enea.com/linux/enea-kernel-cache.git;protocol=ssh;type=kmeta;name=metaenea;branch=${KENEABRANCH};destsuffix=enea-kernel-meta \ 7SRC_URI_append = " git://git@git.enea.com/linux/enea-kernel-cache.git;protocol=ssh;type=kmeta;name=metaenea;branch=${KENEABRANCH};destsuffix=enea-kernel-meta \
8 file://CVE-2017-11176.patch \ 8 file://CVE-2017-11176.patch \
9 file://CVE-2017-1000364.patch \
9 " 10 "
10 11
11KERNEL_FEATURES_append = " features/udev/udev.scc" 12KERNEL_FEATURES_append = " features/udev/udev.scc"