In the Linux kernel, the following vulnerability has been resolved:
bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()
task_pt_regs() can return NULL on powerpc for kernel threads. This is
then used in __bpf_get_stack() to check for user mode, resulting in a
kernel oops. Guard against this by checking return value of
task_pt_regs() before trying to obtain the call chain.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Dec 2024 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 12 Sep 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-06-20T11:13:45.193Z
Updated: 2024-12-19T08:07:24.019Z
Reserved: 2024-06-20T11:09:39.061Z
Link: CVE-2022-48770
Vulnrichment
Updated: 2024-08-03T15:25:01.559Z
NVD
Status : Awaiting Analysis
Published: 2024-06-20T12:15:14.953
Modified: 2024-11-21T07:33:59.260
Link: CVE-2022-48770
Redhat