From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.4 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 20C6BC4BA21 for ; Wed, 26 Feb 2020 22:16:45 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id E7CDB24653 for ; Wed, 26 Feb 2020 22:16:44 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="UF7GZ0n1" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727912AbgBZWQn (ORCPT ); Wed, 26 Feb 2020 17:16:43 -0500 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:51597 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727715AbgBZWQn (ORCPT ); Wed, 26 Feb 2020 17:16:43 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1582755402; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=adv2gMDHdJrSNT8UFFETSumaGBAQt4WCebanQKid9IU=; b=UF7GZ0n1Xz9E8U1XFr5pg5NJ85mz7zOf5kvFcVwVDNbjJSa17Yn91xuac4VLHYUE+g8zWp zHynoIvNUMOFrpviNgNEhAFmDheH6MuddT2TFJHNyw/KwLORBuGqeYwN9+/UK5++JD5mbF ewB4vYHZlOAs0sckW6JuCvOIx5gP9pk= Received: from mail-wr1-f70.google.com (mail-wr1-f70.google.com [209.85.221.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-207-C06umtVxPMyCySJwEmO88w-1; Wed, 26 Feb 2020 17:16:35 -0500 X-MC-Unique: C06umtVxPMyCySJwEmO88w-1 Received: by mail-wr1-f70.google.com with SMTP id p8so392743wrw.5 for ; Wed, 26 Feb 2020 14:16:35 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:subject:to:cc:message-id:date:user-agent :mime-version:content-language:content-transfer-encoding; bh=adv2gMDHdJrSNT8UFFETSumaGBAQt4WCebanQKid9IU=; b=mDbtSSOcNghX3frbVS9m/WBhGMjwjQtKQJVG3iXjeBDhsayqEZpzmTKj22r+t5sKfx E/zbQ4PkfxASB3nX9zm8HSrxfIrQ0Qx87Aw0E5Vkh3JMkLdrNuoKWlH0DddFHd+nQFot g5J0zW3V5UNEl9lx22pCKzFvYRJY9mj3XybQ9EtlkmprN+CK9ifyFR4NMf2mir6UuMb0 vw3foDc0oBMMYAi9FkOH5Qrq6z8gwGc6niOC4rhPgittf8fE3Lzds8XuYPZ5kp/INOeN GHaTjAhJ9BnNCoMmAqvLCsemb/aJQoYIt+20KNspo0jdG+JvqD4GAgDoXaI/w0OARW+w Cx9g== X-Gm-Message-State: APjAAAV8D49ialL6TG/aDWLLfMO/O4aOv6vQkUiBAN2YFftyJOu6O5Fw xaIHiIJMYaLaKw/ughlE4rgLQEACAy09jL0SbPWYJh41zrdToYLZJMitygV6UrxQlpu5KGjzLsH ZIKhz3vLej17zgvjSmx04tfcl X-Received: by 2002:a1c:9a13:: with SMTP id c19mr987169wme.134.1582755394159; Wed, 26 Feb 2020 14:16:34 -0800 (PST) X-Google-Smtp-Source: APXvYqxmsicT3h4tLxMLXoSzTW55n/I22wHMyHI3oCwdmxH72apFzjH20mlpy8BOATYE62y6EP1+Dw== X-Received: by 2002:a1c:9a13:: with SMTP id c19mr987142wme.134.1582755393863; Wed, 26 Feb 2020 14:16:33 -0800 (PST) Received: from x1.localdomain (2001-1c00-0c0c-fe00-fc7e-fd47-85c1-1ab3.cable.dynamic.v6.ziggo.nl. [2001:1c00:c0c:fe00:fc7e:fd47:85c1:1ab3]) by smtp.gmail.com with ESMTPSA id b10sm4974284wrw.61.2020.02.26.14.16.32 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 26 Feb 2020 14:16:32 -0800 (PST) From: Hans de Goede Subject: Updating cypress/brcm firmware in linux-firmware for CVE-2019-15126 To: Chi-Hsien Lin , Chirjeev Singh , Chung-Hsien Hsu List-Id: Cc: linux-firmware@kernel.org, Linux Kernel Mailing List Message-ID: <93dba8d2-6e46-9157-d292-4d93feb8ec1a@redhat.com> Date: Wed, 26 Feb 2020 23:16:32 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Message-ID: <20200226221632.SE_l8Z7sCmidz-Fk6KKxwysKP0ygOoVhIUHtgU_xbC0@z> Hello Cypress people, Can we please get updated firmware for brcm/brcmfmac4356-pcie.bin and brcm/brcmfmac4356-sdio.bin fixing CVE-2019-15126 as well as for any other affected models (the 4356 is explicitly named in the CVE description) ? The current Cypress firmware files in linux-firmware are quite old, e.g. for brcm/brcmfmac4356-pcie.bin linux-firmware has: version 7.35.180.176 dated 2017-10-23, way before the CVE Where as https://community.cypress.com/docs/DOC-19000 / cypress-fmac-v4.14.77-2020_0115.zip has: version 7.35.180.197 which presumably contains a fix (no changelog) Regards, Hans