[ubuntu/lunar-proposed] libbpf 1.0.1-2ubuntu1 (Accepted)
Nishit Majithia
nishit.majithia at canonical.com
Wed Dec 7 00:14:14 UTC 2022
libbpf (1.0.1-2ubuntu1) lunar; urgency=medium
* SECURITY UPDATE: heap overflow vulnerability
- debian/patches/CVE-2021-45940_45941.patch: Use elf_getshdrnum()
instead of e_shnum
- CVE-2021-45940
- CVE-2021-45941
* SECURITY UPDATE: memory leak due to argument reg_name
- debian/patches/CVE-2022-3533.patch: Fix memory leak in
parse_usdt_arg()
- CVE-2022-3533
* SECURITY UPDATE: use-after-free vulnerability
- debian/patches/CVE-2022-3534.patch: Fix use-after-free in
btf_dump_name_dups
- CVE-2022-3534
* SECURITY UPDATE: null pointer dereference vulnerability
- debian/patches/CVE-2022-3606.patch: Fix null-pointer dereference in
find_prog_by_sec_insn()
- CVE-2022-3606
Date: Thu, 01 Dec 2022 15:29:38 +0530
Changed-By: Nishit Majithia <nishit.majithia at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Alex Murray <alex.murray at canonical.com>
https://launchpad.net/ubuntu/+source/libbpf/1.0.1-2ubuntu1
-------------- next part --------------
Format: 1.8
Date: Thu, 01 Dec 2022 15:29:38 +0530
Source: libbpf
Built-For-Profiles: noudeb
Architecture: source
Version: 1.0.1-2ubuntu1
Distribution: lunar
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Nishit Majithia <nishit.majithia at canonical.com>
Changes:
libbpf (1.0.1-2ubuntu1) lunar; urgency=medium
.
* SECURITY UPDATE: heap overflow vulnerability
- debian/patches/CVE-2021-45940_45941.patch: Use elf_getshdrnum()
instead of e_shnum
- CVE-2021-45940
- CVE-2021-45941
* SECURITY UPDATE: memory leak due to argument reg_name
- debian/patches/CVE-2022-3533.patch: Fix memory leak in
parse_usdt_arg()
- CVE-2022-3533
* SECURITY UPDATE: use-after-free vulnerability
- debian/patches/CVE-2022-3534.patch: Fix use-after-free in
btf_dump_name_dups
- CVE-2022-3534
* SECURITY UPDATE: null pointer dereference vulnerability
- debian/patches/CVE-2022-3606.patch: Fix null-pointer dereference in
find_prog_by_sec_insn()
- CVE-2022-3606
Checksums-Sha1:
fcfe4e950f1d77c62cdbfe9ab8ee3d45f1e0f902 1688 libbpf_1.0.1-2ubuntu1.dsc
498a2c2b3595ef47a3617193d01a4a0107d1b598 10836 libbpf_1.0.1-2ubuntu1.debian.tar.xz
527f1a7f445d6c593feba868c4d08411e906186f 5971 libbpf_1.0.1-2ubuntu1_source.buildinfo
Checksums-Sha256:
84dce12eae1b5a648bf65f117613b254ade2371bf43f70331337ba36db191cf6 1688 libbpf_1.0.1-2ubuntu1.dsc
8818f2f9f8eb4ddbe7043cc130f15b9d1274441de63134d7b0d31f905bea7fcc 10836 libbpf_1.0.1-2ubuntu1.debian.tar.xz
7951c3365e956b8de27241bdc17ff148321ec6048acec6cc131b3fd937e40d45 5971 libbpf_1.0.1-2ubuntu1_source.buildinfo
Files:
d404e889f18805d55c5305129a3f3485 1688 libs optional libbpf_1.0.1-2ubuntu1.dsc
c5bfceaa8c7c951089939348e51db40f 10836 libs optional libbpf_1.0.1-2ubuntu1.debian.tar.xz
509f2b0d9ed94ad86e105d61890d6cc8 5971 libs optional libbpf_1.0.1-2ubuntu1_source.buildinfo
Original-Maintainer: Sudip Mukherjee <sudipm.mukherjee at gmail.com>
More information about the lunar-changes
mailing list