forked from mirrors/nixpkgs
23f5e3c90f
The PoC provided successfully escalates privileges from a local user to root. The vulnerability affects any Linux Kernel version 3.8 and higher. http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
20 lines
626 B
Nix
20 lines
626 B
Nix
{ stdenv, fetchurl, perl, buildLinux, ... } @ args:
|
|
|
|
import ./generic.nix (args // rec {
|
|
version = "4.1.15";
|
|
extraMeta.branch = "4.1";
|
|
|
|
src = fetchurl {
|
|
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
|
|
sha256 = "18sr0dl5ax6pcx6nqp9drb4l6a38g07vxihiqpbwb231jv68h8j7";
|
|
};
|
|
|
|
kernelPatches = args.kernelPatches ++ [ { name = "cve-2016-0728"; patch = ./cve-2016-0728.patch; } ];
|
|
|
|
features.iwlwifi = true;
|
|
features.efiBootStub = true;
|
|
features.needsCifsUtils = true;
|
|
features.canDisableNetfilterConntrackHelpers = true;
|
|
features.netfilterRPFilter = true;
|
|
} // (args.argsOverride or {}))
|