Debian Patches
Status for libseccomp/2.6.0-2
Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
api_fix_seccomp_export_bpf_mem_out-of-bounds_read.patch | [PATCH] api: fix seccomp_export_bpf_mem out-of-bounds read *len is the length of the destination buffer, but program->blks is probably not anywhere near that long. It's already been checked above that BPF_PGM_SIZE(program) is less than or equal to *len, so that's the correct value to use here to avoid either reading or writing too much. I noticed this because tests/11-basic-basic_errors started failing on musl after e797591 ("all: add seccomp_precompute() functionality"). |
Alyssa Ross <hi@alyssa.is> | no | 2025-02-13 | ||
hash_fix_strict_aliasing_UB_in_MurMur_hash_implementation.patch | [PATCH] hash: fix strict aliasing UB in MurMur hash implementation This was spotted when trying to upgrade the libseccomp fedora package to version 2.6.0 in fedora rawhide. It comes with gcc 15 and LTO enabled by default. When running the test 61-sim-transactions we get plenty of such errors in valgrind: ==265507== Use of uninitialised value of size 8 ==265507== at 0x4096AD: _hsh_add (gen_bpf.c:599) ==265507== by 0x40A557: UnknownInlinedFun (gen_bpf.c:2016) ==265507== by 0x40A557: gen_bpf_generate (gen_bpf.c:2341) ==265507== by 0x400CDE: UnknownInlinedFun (db.c:2685) ==265507== by 0x400CDE: UnknownInlinedFun (db.c:2682) ==265507== by 0x400CDE: UnknownInlinedFun (api.c:756) ==265507== by 0x400CDE: UnknownInlinedFun (util.c:162) ==265507== by 0x400CDE: UnknownInlinedFun (util.c:153) ==265507== by 0x400CDE: main (61-sim-transactions.c:128) ==265507== Uninitialised value was created by a stack allocation ==265507== at 0x409590: _hsh_add (gen_bpf.c:573) Investigating this a bit, it seems that because of LTO the MurMur hash implementation is being inlined in _hsh_add. The two buffers data and blocks to point at the same underlying data, but via incompatible type, which is a strict aliasing violation. Instead, remove the getblock32 function and inline the copy with memcpy. This is reproducible on a "fedora:rawhide" container (gcc 15) and using: export CFLAGS='-O2 -flto=auto -ffat-lto-objects -g' [PM: subject line tweak] |
Romain Geissler <romain.geissler@amadeus.com> | no | 2025-02-18 | ||
python_single_version_externally_managed.patch | Fix building with setuptools instead of distutils. | no | ||||
tests_remove_the_fuzzer_from_test_62-sim-arch_transactions.patch | [PATCH] tests: remove the fuzzer from test 62-sim-arch_transactions We can't reliably run the bpf-sim-fuzz tests on tests which manipulate the filters arch/ABIs unless the filter is safe to run on all arch/ABIs, which is more or less impossible. Remove the bpf-sim-fuzz test section in test #62 to work around this, just as we do with the other similar tests. (cherry picked from commit 7db46d72f13c172b290818f624c2966bd0db5677) |
Paul Moore <paul@paul-moore.com> | no | 2025-01-25 |
Showing 1 to 4 of 4 entries
All known versions for source package 'libseccomp'
- 2.6.0-2 (sid, trixie)
- 2.5.4-1+deb12u1 (bookworm)
- 2.5.1-1+deb11u1 (bullseye)