ACK: [B, B:hwe, F, F:oem-5.6, F:oem-5.10, G][PATCH 0/2] CVE-2021-29154 - Linux kernel incorrect computation of branch displacements in BPF JIT compiler can be abused to execute arbitrary code in Kernel mode
Thadeu Lima de Souza Cascardo
cascardo at canonical.com
Thu Apr 8 18:31:25 UTC 2021
- Previous message (by thread): [B:hwe, F, F:oem-5.6, F:oem-5.10, G][PATCH 2/2] UBUNTU: SAUCE: bpf, x86: Validate computation of branch displacements for x86-32
- Next message (by thread): ACK/Cmnt: [B, B:hwe, F, F:oem-5.6, F:oem-5.10, G][PATCH 0/2] CVE-2021-29154 - Linux kernel incorrect computation of branch displacements in BPF JIT compiler can be abused to execute arbitrary code in Kernel mode
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Acked-by: Thadeu Lima de Souza Cascardo <cascardo at canonical.com>
- Previous message (by thread): [B:hwe, F, F:oem-5.6, F:oem-5.10, G][PATCH 2/2] UBUNTU: SAUCE: bpf, x86: Validate computation of branch displacements for x86-32
- Next message (by thread): ACK/Cmnt: [B, B:hwe, F, F:oem-5.6, F:oem-5.10, G][PATCH 0/2] CVE-2021-29154 - Linux kernel incorrect computation of branch displacements in BPF JIT compiler can be abused to execute arbitrary code in Kernel mode
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the kernel-team
mailing list