We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: bpf: Check validity of link->type in bpf_link_show_fdinfo() If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing bpf_link_type_strs[link->type] may result in an out-of-bounds access. To spot such missed invocations early in the future, checking the validity of link->type in bpf_link_show_fdinfo() and emitting a warning when such invocations are missed.
Reserved 2024-11-19 | Published 2024-11-25 | Updated 2025-01-09 | Assigner Linuxgit.kernel.org/...c/79f87a6ec39fb5968049a6775a528bf58b25c20a
git.kernel.org/...c/24fec234d2ba9ca3c14e545ebe3fd6dcb47f074d
git.kernel.org/...c/4e8074bb33d18f56af30a0252cb3606d27eb1c13
git.kernel.org/...c/d5092b0a1aaf35d77ebd8d33384d7930bec5cb5d
git.kernel.org/...c/b3eb1b6a9f745d6941b345f0fae014dc8bb06d36
git.kernel.org/...c/8421d4c8762bd022cb491f2f0f7019ef51b4f0a7
Support options