In the Linux kernel, the following vulnerability has been resolved:
bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()
task_pt_regs() can return NULL on powerpc for kernel threads. This is
then used in __bpf_get_stack() to check for user mode, resulting in a
kernel oops. Guard against this by checking return value of
task_pt_regs() before trying to obtain the call chain.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-06-20 12:15
Updated : 2025-01-06 21:43
NVD link : CVE-2022-48770
Mitre link : CVE-2022-48770
CVE.ORG link : CVE-2022-48770
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
