-
## CVE-2021-38300 - High Severity Vulnerability
Vulnerable Library - linux-stable-rtv4.1.33
Julia Cartwright's fork of linux-stable-rt.git
Library home page: https://git.kernel.org/pub/scm/linux/ke…
-
## CVE-2021-38300 - High Severity Vulnerability
Vulnerable Library - kernelv4.19.76
Our patched kernel sources. This repository is generated from https://github.com/openSUSE/kernel-source
Library h…
-
## CVE-2021-29154 - High Severity Vulnerability
Vulnerable Library - linuxv4.19
Linux kernel source tree
Library home page: https://github.com/torvalds/linux.git
Found in HEAD commit: d80c4f847c910…
-
CFI is currently disabled for [the BPF dispatcher functions](https://elixir.bootlin.com/linux/v6.0-rc7/source/include/linux/bpf.h#L898), as they may call JIT compiled code that's missing CFI type hash…
-
## CVE-2021-38300 - High Severity Vulnerability
Vulnerable Library - linux-stable-rtv4.1.33
Julia Cartwright's fork of linux-stable-rt.git
Library home page: https://git.kernel.org/pub/scm/linux/ke…
-
## CVE-2021-29154 - High Severity Vulnerability
Vulnerable Library - linux-yoctov5.4.51
Yocto Linux Embedded kernel
Library home page: https://git.yoctoproject.org/git/linux-yocto
Found in HEAD com…
-
Hello, running the run_benchmark. py script to start the benchmark test shows FileNotFoundError: [Errno 2] No such file or directory: 'ubpf jit'. Is it because the executable file is not compatible wi…
-
https://github.com/iovisor/ubpf/blob/6492b7a9363ea1e32194a95b66617df0f7fd42de/vm/ubpf_vm.c#L27
The [ebpf-for-windows](https://github.com/microsoft/ebpf-for-windows) uses a disjointed helper-id spac…
-
There are no tests that exercise the constant blinding features of the eBPF VM and JIT. These should be added to make sure the defenses do not regress. These would likely live in `lib/test_bpf.c`.
-
## Steps to Reproduce
1. Trying exact code at: https://www.mono-project.com/docs/advanced/embedding/
2. Compiles fine.
3. Link can't find mono_jit_init
### Current Behavior
```
cc `pkg-c…