HomeDefault status
unaffected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before df02c3ff3be4bf998812c8c8e79d10db1329d535
affected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 7beae54111c34ca63357ef120e115889b915beb5
affected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d1aab1ca576c90192ba961094d51b0be6355a4d6
affected
Default status
affected
6.18.16 (semver)
unaffected
6.19.6 (semver)
unaffected
7.0 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Properly mark live registers for indirect jumps For a `gotox rX` instruction the rX register should be marked as used in the compute_insn_live_regs() function. Fix this.
Product status
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before df02c3ff3be4bf998812c8c8e79d10db1329d535
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 7beae54111c34ca63357ef120e115889b915beb5
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d1aab1ca576c90192ba961094d51b0be6355a4d6
6.18.16 (semver)
6.19.6 (semver)
7.0 (original_commit_for_fix)
References
git.kernel.org/...c/df02c3ff3be4bf998812c8c8e79d10db1329d535
git.kernel.org/...c/7beae54111c34ca63357ef120e115889b915beb5
git.kernel.org/...c/d1aab1ca576c90192ba961094d51b0be6355a4d6