lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20171221025747.5071-1-daniel@iogearbox.net>
Date:   Thu, 21 Dec 2017 03:57:47 +0100
From:   Daniel Borkmann <daniel@...earbox.net>
To:     davem@...emloft.net
Cc:     daniel@...earbox.net, ast@...nel.org, netdev@...r.kernel.org
Subject: pull-request: bpf 2017-12-21

Hi David,

The following pull-request contains BPF updates for your *net* tree.

The main changes are:

1) Fix multiple security issues in the BPF verifier mostly related
   to the value and min/max bounds tracking rework in 4.14. Issues
   range from incorrect bounds calculation in some BPF_RSH cases,
   to improper sign extension and reg size handling on 32 bit
   ALU ops, missing strict alignment checks on stack pointers, and
   several others that got fixed, from Jann, Alexei and Edward.

2) Fix various build failures in BPF selftests on sparc64. More
   specifically, librt needed to be added to the libs to link
   against and few format string fixups for sizeof, from David.

3) Fix one last remaining issue from BPF selftest build that was
   still occuring on s390x from the asm/bpf_perf_event.h include
   which could not find the asm/ptrace.h copy, from Hendrik.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git

Thanks a lot!

----------------------------------------------------------------

The following changes since commit ab14436065c8066c265540312742390d6d07ddd2:

  net: phy: xgene: disable clk on error paths (2017-12-18 15:09:42 -0500)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

for you to fetch changes up to 82abbf8d2fc46d79611ab58daa7c608df14bb3ee:

  bpf: do not allow root to mangle valid pointers (2017-12-21 02:26:29 +0100)

----------------------------------------------------------------
Alexei Starovoitov (2):
      bpf: fix integer overflows
      bpf: do not allow root to mangle valid pointers

Daniel Borkmann (1):
      Merge branch 'bpf-verifier-sec-fixes'

David Miller (1):
      bpf: Fix tools and testing build.

Edward Cree (1):
      bpf/verifier: fix bounds calculation on BPF_RSH

Hendrik Brueckner (1):
      bpf: fix broken BPF selftest build on s390

Jann Horn (7):
      bpf: fix incorrect sign extension in check_alu_op()
      bpf: fix incorrect tracking of register size truncation
      bpf: fix 32-bit ALU op verification
      bpf: fix missing error return in check_stack_boundary()
      bpf: force strict alignment checks for stack pointers
      bpf: don't prune branches when a scalar is replaced with a pointer
      selftests/bpf: add tests for recent bugfixes

 include/linux/bpf_verifier.h                      |   4 +-
 kernel/bpf/verifier.c                             | 277 +++++-----
 tools/arch/s390/include/uapi/asm/bpf_perf_event.h |   2 +-
 tools/testing/selftests/bpf/Makefile              |   2 +-
 tools/testing/selftests/bpf/test_progs.c          |   8 +-
 tools/testing/selftests/bpf/test_verifier.c       | 605 ++++++++++++++++++++--
 6 files changed, 730 insertions(+), 168 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ