lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 19 Jan 2019 16:44:36 -0800 (PST) From: David Miller <davem@...emloft.net> To: daniel@...earbox.net Cc: ast@...nel.org, netdev@...r.kernel.org Subject: Re: pull-request: bpf 2019-01-20 From: Daniel Borkmann <daniel@...earbox.net> Date: Sun, 20 Jan 2019 01:33:34 +0100 > The following pull-request contains BPF updates for your *net* tree. > > The main changes are: > > 1) Fix a out-of-bounds access in __bpf_redirect_no_mac, from Willem. > > 2) Fix bpf_setsockopt to reset sock dst on SO_MARK changes, from Peter. > > 3) Fix map in map masking to prevent out-of-bounds access under > speculative execution, from Daniel. > > 4) Fix bpf_setsockopt's SO_MAX_PACING_RATE to support TCP internal > pacing, from Yuchung. > > 5) Fix json writer license in bpftool, from Thomas. > > 6) Fix AF_XDP to check if an actually queue exists during umem > setup, from Krzysztof. > > 7) Several fixes to BPF stackmap's build id handling. Another fix > for bpftool build to account for libbfd variations wrt linking > requirements, from Stanislav. > > 8) Fix BPF samples build with clang by working around missing asm > goto, from Yonghong. > > 9) Fix libbpf to retry program load on signal interrupt, from Lorenz. > > 10) Various minor compile warning fixes in BPF code, from Mathieu. > > Please consider pulling these changes from: > > git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git Pulled, thanks Daniel.
Powered by blists - more mailing lists