-
libbpf (1.1.0-1) unstable; urgency=medium
* New upstream version 1.1.0
- Update symbols.
-- Sudip Mukherjee <email address hidden> Fri, 06 Jan 2023 20:31:46 +0000
-
libbpf (1.0.1-2ubuntu1) lunar; urgency=medium
* SECURITY UPDATE: heap overflow vulnerability
- debian/patches/CVE-2021-45940_45941.patch: Use elf_getshdrnum()
instead of e_shnum
- CVE-2021-45940
- CVE-2021-45941
* SECURITY UPDATE: memory leak due to argument reg_name
- debian/patches/CVE-2022-3533.patch: Fix memory leak in
parse_usdt_arg()
- CVE-2022-3533
* SECURITY UPDATE: use-after-free vulnerability
- debian/patches/CVE-2022-3534.patch: Fix use-after-free in
btf_dump_name_dups
- CVE-2022-3534
* SECURITY UPDATE: null pointer dereference vulnerability
- debian/patches/CVE-2022-3606.patch: Fix null-pointer dereference in
find_prog_by_sec_insn()
- CVE-2022-3606
-- Nishit Majithia <email address hidden> Thu, 01 Dec 2022 15:29:38 +0530
-
libbpf (1.0.1-2) unstable; urgency=medium
* Upload to unstable.
-- Sudip Mukherjee <email address hidden> Sun, 06 Nov 2022 00:00:07 +0000
-
libbpf (0.8.0-1) unstable; urgency=medium
* New upstream version 0.8.0
- Update symbols.
- Update copyright.
-- Sudip Mukherjee <email address hidden> Sun, 05 Jun 2022 16:27:21 +0100