-
## CVE-2021-29154 - High Severity Vulnerability
Vulnerable Library - linux-yoctov5.4.51
Yocto Linux Embedded kernel
Library home page: https://git.yoctoproject.org/git/linux-yocto
Found in HEAD com…
-
## CVE-2021-29154 - High Severity Vulnerability
Vulnerable Library - linuxlinux-4.19.236
The Linux Kernel
Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux
Foun…
-
## CVE-2021-29154 - High Severity Vulnerability
Vulnerable Library - linux-yoctov5.4.51
Yocto Linux Embedded kernel
Library home page: https://git.yoctoproject.org/git/linux-yocto
Found in HEAD com…
-
I'm attempting to write an eBPF program to get the pathname from a file descriptor, but I am finding it difficult to get it to work. The program hooks onto the sys_enter_write tracepoint and gets a fi…
-
Hi,
I could see that you are at version 4.9.92 without the support of retpoline [Linux 4.9.77].
However, I have created a port for version 4.9.74 which is available [here](https://github.com/HacKu…
-
## CVE-2021-29154 - High Severity Vulnerability
Vulnerable Library - linuxlinux-4.19.237
The Linux Kernel
Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux
Foun…
-
## CVE-2021-29154 - High Severity Vulnerability
Vulnerable Library - linux-stable-rtv4.1.33
Julia Cartwright's fork of linux-stable-rt.git
Library home page: https://git.kernel.org/pub/scm/linux/ke…
-
Hi! I have some working PoC and ideas, and I would like to get some comments or feedbacks before I going on this.
## motivation
- Alrough the use of bcc for new BPF applications is strongly disc…
-
## Reporting an issue
- [x] I considered whether to report to the BPF mailing list first
## Environment
- bpftool version: current git master
- Linux kernel version: 6.11.3
- (optionally) c…
-
Steps to reproduce the behavior:
1. Enable hardened profile
2. Use kernel 5.5
Error:
```
systemd-sysctl[25177]: Couldn't write '0' to 'net/core/bpf_jit_enable': Invalid argument
systemd-sysctl…