diff options
author | Hauke Mehrtens <hauke@hauke-m.de> | 2018-08-15 18:53:23 +0200 |
---|---|---|
committer | Hauke Mehrtens <hauke@hauke-m.de> | 2018-08-15 19:18:47 +0200 |
commit | f3865bd4efa8c0fbf82899d0c3072a192f3beaea (patch) | |
tree | 0767cde9a67454fcc07ca3fb21bf40234e451317 /target/linux/generic/patches-4.4/901-debloat_sock_diag.patch | |
parent | 5886a5060a4cd17e87a60028d878525150075653 (diff) | |
download | upstream-f3865bd4efa8c0fbf82899d0c3072a192f3beaea.tar.gz upstream-f3865bd4efa8c0fbf82899d0c3072a192f3beaea.tar.bz2 upstream-f3865bd4efa8c0fbf82899d0c3072a192f3beaea.zip |
kernel: bump kernel 4.4 to version 4.4.148
The following patch was integrated upstream:
* target/linux/generic/patches-4.4/005-ext4-fix-check-to-prevent-initializing-reserved-inod.patch
This fixes tries to work around the following security problems:
* CVE-2018-3620 L1 Terminal Fault OS, SMM related aspects
* CVE-2018-3646 L1 Terminal Fault Virtualization related aspects
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Diffstat (limited to 'target/linux/generic/patches-4.4/901-debloat_sock_diag.patch')
-rw-r--r-- | target/linux/generic/patches-4.4/901-debloat_sock_diag.patch | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/target/linux/generic/patches-4.4/901-debloat_sock_diag.patch b/target/linux/generic/patches-4.4/901-debloat_sock_diag.patch index b304e141b9..1dc89d52e2 100644 --- a/target/linux/generic/patches-4.4/901-debloat_sock_diag.patch +++ b/target/linux/generic/patches-4.4/901-debloat_sock_diag.patch @@ -39,7 +39,7 @@ --- a/net/ipv4/Kconfig +++ b/net/ipv4/Kconfig -@@ -415,6 +415,7 @@ config INET_LRO +@@ -416,6 +416,7 @@ config INET_LRO config INET_DIAG tristate "INET: socket monitoring interface" |