lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20210715210603.276717-1-andrii@kernel.org>
Date:   Thu, 15 Jul 2021 14:06:03 -0700
From:   Andrii Nakryiko <andrii@...nel.org>
To:     <davem@...emloft.net>
CC:     <kuba@...nel.org>, <daniel@...earbox.net>, <ast@...nel.org>,
        <netdev@...r.kernel.org>, <bpf@...r.kernel.org>,
        <andrii@...nel.org>
Subject: pull-request: bpf 2021-07-15

Hi David, hi Jakub,

The following pull-request contains BPF updates for your *net* tree.

We've added 9 non-merge commits during the last 5 day(s) which contain
a total of 9 files changed, 37 insertions(+), 15 deletions(-).

The main changes are:

1) Fix NULL pointer dereference in BPF_TEST_RUN for BPF_XDP_DEVMAP and
   BPF_XDP_CPUMAP programs, from Xuan Zhuo.

2) Fix use-after-free of net_device in XDP bpf_link, from Xuan Zhuo.

3) Follow-up fix to subprog poke descriptor use-after-free problem, from
   Daniel Borkmann and John Fastabend.

4) Fix out-of-range array access in s390 BPF JIT backend, from Colin Ian King.

5) Fix memory leak in BPF sockmap, from John Fastabend.

6) Fix for sockmap to prevent proc stats reporting bug, from John Fastabend
   and Jakub Sitnicki.

7) Fix NULL pointer dereference in bpftool, from Tobias Klauser.

8) AF_XDP documentation fixes, from Baruch Siach.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Abaci, Andrii Nakryiko, Cong Wang, David Ahern, Dust Li, Ilya 
Leoshkevich, Jesper Dangaard Brouer, John Fastabend, Maciej Fijalkowski, 
Magnus Karlsson, Quentin Monnet, Roman Gushchin, Song Liu

----------------------------------------------------------------

The following changes since commit a5de4be0aaaa66a2fa98e8a33bdbed3bd0682804:

  net: phy: marvell10g: fix differentiation of 88X3310 from 88X3340 (2021-07-11 10:02:33 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

for you to fetch changes up to d444b06e40855219ef38b5e9286db16d435f06dc:

  bpftool: Check malloc return value in mount_bpffs_for_pin (2021-07-15 20:01:36 +0200)

----------------------------------------------------------------
Baruch Siach (1):
      doc, af_xdp: Fix bind flags option typo

Colin Ian King (1):
      s390/bpf: Perform r1 range checking before accessing jit->seen_reg[r1]

Daniel Borkmann (1):
      bpf: Fix tail_call_reachable rejection for interpreter when jit failed

Jakub Sitnicki (1):
      bpf, sockmap, udp: sk_prot needs inuse_idx set for proc stats

John Fastabend (2):
      bpf, sockmap: Fix potential memory leak on unlikely error case
      bpf, sockmap, tcp: sk_prot needs inuse_idx set for proc stats

Tobias Klauser (1):
      bpftool: Check malloc return value in mount_bpffs_for_pin

Xuan Zhuo (2):
      bpf, test: fix NULL pointer dereference on invalid expected_attach_type
      xdp, net: Fix use-after-free in bpf_xdp_link_release

 Documentation/networking/af_xdp.rst |  6 +++---
 arch/s390/net/bpf_jit_comp.c        |  2 +-
 kernel/bpf/verifier.c               |  2 ++
 net/bpf/test_run.c                  |  3 +++
 net/core/dev.c                      | 14 ++++++++++----
 net/core/skmsg.c                    | 16 +++++++++++-----
 net/ipv4/tcp_bpf.c                  |  2 +-
 net/ipv4/udp_bpf.c                  |  2 +-
 tools/bpf/bpftool/common.c          |  5 +++++
 9 files changed, 37 insertions(+), 15 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ