Description
In the Linux kernel, the following vulnerability has been resolved: x86/bpf: Fix IP after emitting call depth accounting Adjust the IP passed to `emit_patch` so it calculates the correct offset for the CALL instruction if `x86_call_depth_emit_accounting` emits code. Otherwise we will skip some instructions and most likely crash.
Product status
b2e9dfe54be4d023124d588d6f03d16a9c0d2507 (git) before 3f9d57c771656bfd651e22edcfdb5f60e62542d4
b2e9dfe54be4d023124d588d6f03d16a9c0d2507 (git) before 81166178cf0a0062a22b1b3b5368183d39577028
b2e9dfe54be4d023124d588d6f03d16a9c0d2507 (git) before 9d98aa088386aee3db1b7b60b800c0fde0654a4a
6.2
Any version before 6.2
6.6.26 (semver)
6.8.5 (semver)
6.9 (original_commit_for_fix)
References
git.kernel.org/...c/3f9d57c771656bfd651e22edcfdb5f60e62542d4
git.kernel.org/...c/81166178cf0a0062a22b1b3b5368183d39577028
git.kernel.org/...c/9d98aa088386aee3db1b7b60b800c0fde0654a4a