From e568d65e41f3fde7db8a8aab60ac7e750ea73325 Mon Sep 17 00:00:00 2001 From: Sona Sarmadi Date: Thu, 21 Jan 2016 13:14:31 +0100 Subject: security-keys: CVE-2016-0728 Fixes possible use-after-free vulnerability in keyring facility. Introduced by: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/ ?id=3a50597de8635cd05133bd12c95681c82fe7b878 References: http://perception-point.io/2016/01/14/analysis-and-exploitation-of- a-linux-kernel-vulnerability-cve-2016-0728/ https://bugzilla.redhat.com/show_bug.cgi?id=1297475 Red Hat KCS article: https://access.redhat.com/articles/2131021 Patch is taken from: https://bugzilla.redhat.com/attachment.cgi?id=1116563 Signed-off-by: Sona Sarmadi Signed-off-by: Tudor Florea --- recipes-kernel/linux/linux-hierofalcon_3.19.bb | 1 + 1 file changed, 1 insertion(+) (limited to 'recipes-kernel/linux/linux-hierofalcon_3.19.bb') diff --git a/recipes-kernel/linux/linux-hierofalcon_3.19.bb b/recipes-kernel/linux/linux-hierofalcon_3.19.bb index 6e44bbc..6e77066 100644 --- a/recipes-kernel/linux/linux-hierofalcon_3.19.bb +++ b/recipes-kernel/linux/linux-hierofalcon_3.19.bb @@ -28,6 +28,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto-3.19;branch="standard/qemuarm6 file://ipv6-CVE-2015-2922.patch \ file://ipv4-CVE-2015-3636.patch \ file://usb-whiteheat-CVE-2015-5257.patch \ + file://security-keys-CVE-2016-0728.patch \ " S = "${WORKDIR}/git" -- cgit v1.2.3-54-g00ecf