Revert "linux kernels: patch against DCCP double free (CVE-2017-6074)"

This reverts commit 1d68edbef48f30a4cefc33a85636099582411957.

-19
-9
pkgs/os-specific/linux/kernel/patches.nix
··· 174 174 sha256 = "0mps33r4mnwiy0bmgrzgqkrk59yya17v6kzpv9024g4xlz61rk8p"; 175 175 }; 176 176 }; 177 - 178 - DCCP_double_free_vulnerability_CVE-2017-6074 = rec 179 - { name = "DCCP_double_free_vulnerability_CVE-2017-6074.patch"; 180 - patch = fetchpatch { 181 - inherit name; 182 - url = "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4"; 183 - sha256 = "10dmv3d3gj8rvj9h40js4jh8xbr5wyaqiy0kd819mya441mj8ll2"; 184 - }; 185 - }; 186 177 }
-10
pkgs/top-level/all-packages.nix
··· 11273 11273 kernelPatches = 11274 11274 [ kernelPatches.bridge_stp_helper 11275 11275 kernelPatches.packet_fix_race_condition_CVE_2016_8655 11276 - kernelPatches.DCCP_double_free_vulnerability_CVE-2017-6074 11277 11276 ] 11278 11277 ++ lib.optionals ((platform.kernelArch or null) == "mips") 11279 11278 [ kernelPatches.mips_fpureg_emu ··· 11286 11285 kernelPatches = with kernelPatches; [ 11287 11286 bridge_stp_helper 11288 11287 packet_fix_race_condition_CVE_2016_8655 11289 - DCCP_double_free_vulnerability_CVE-2017-6074 11290 11288 ]; 11291 11289 }; 11292 11290 ··· 11295 11293 [ bridge_stp_helper 11296 11294 lguest_entry-linkage 11297 11295 packet_fix_race_condition_CVE_2016_8655 11298 - DCCP_double_free_vulnerability_CVE-2017-6074 11299 11296 ] 11300 11297 ++ lib.optionals ((platform.kernelArch or null) == "mips") 11301 11298 [ kernelPatches.mips_fpureg_emu ··· 11307 11304 linux_3_12 = callPackage ../os-specific/linux/kernel/linux-3.12.nix { 11308 11305 kernelPatches = with kernelPatches; 11309 11306 [ bridge_stp_helper 11310 - DCCP_double_free_vulnerability_CVE-2017-6074 11311 11307 ] 11312 11308 ++ lib.optionals ((platform.kernelArch or null) == "mips") 11313 11309 [ kernelPatches.mips_fpureg_emu ··· 11319 11315 linux_4_1 = callPackage ../os-specific/linux/kernel/linux-4.1.nix { 11320 11316 kernelPatches = 11321 11317 [ kernelPatches.bridge_stp_helper 11322 - kernelPatches.DCCP_double_free_vulnerability_CVE-2017-6074 11323 11318 ] 11324 11319 ++ lib.optionals ((platform.kernelArch or null) == "mips") 11325 11320 [ kernelPatches.mips_fpureg_emu ··· 11332 11327 kernelPatches = 11333 11328 [ kernelPatches.bridge_stp_helper 11334 11329 kernelPatches.cpu-cgroup-v2."4.4" 11335 - kernelPatches.DCCP_double_free_vulnerability_CVE-2017-6074 11336 11330 ] 11337 11331 ++ lib.optionals ((platform.kernelArch or null) == "mips") 11338 11332 [ kernelPatches.mips_fpureg_emu ··· 11349 11343 # !!! 4.7 patch doesn't apply, 4.9 patch not up yet, will keep checking 11350 11344 # kernelPatches.cpu-cgroup-v2."4.7" 11351 11345 kernelPatches.modinst_arg_list_too_long 11352 - kernelPatches.DCCP_double_free_vulnerability_CVE-2017-6074 11353 11346 ] 11354 11347 ++ lib.optionals ((platform.kernelArch or null) == "mips") 11355 11348 [ kernelPatches.mips_fpureg_emu ··· 11378 11371 kernelPatches = [ 11379 11372 kernelPatches.bridge_stp_helper 11380 11373 kernelPatches.modinst_arg_list_too_long 11381 - kernelPatches.DCCP_double_free_vulnerability_CVE-2017-6074 11382 11374 ] ++ lib.optionals ((platform.kernelArch or null) == "mips") [ 11383 11375 kernelPatches.mips_fpureg_emu 11384 11376 kernelPatches.mips_fpu_sigill ··· 11391 11383 kernelPatches.chromiumos_mfd_fix_dependency 11392 11384 kernelPatches.chromiumos_no_link_restrictions 11393 11385 kernelPatches.genksyms_fix_segfault 11394 - kernelPatches.DCCP_double_free_vulnerability_CVE-2017-6074 11395 11386 ]; 11396 11387 }; 11397 11388 ··· 11399 11390 kernelPatches = [ kernelPatches.chromiumos_Kconfig_fix_entries_3_18 11400 11391 kernelPatches.chromiumos_no_link_restrictions 11401 11392 kernelPatches.genksyms_fix_segfault 11402 - kernelPatches.DCCP_double_free_vulnerability_CVE-2017-6074 11403 11393 ]; 11404 11394 }; 11405 11395