In the Linux kernel, the following vulnerability has been resolved:
x86/bpf: Fix IP after emitting call depth accounting
Adjust the IP passed to `emit_patch` so it calculates the correct offset
for the CALL instruction if `x86_call_depth_emit_accounting` emits code.
Otherwise we will skip some instructions and most likely crash.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-05-19 09:15
Updated : 2025-09-24 21:06
NVD link : CVE-2024-35903
Mitre link : CVE-2024-35903
CVE.ORG link : CVE-2024-35903
JSON object : View
Products Affected
linux
- linux_kernel
CWE
