In the Linux kernel, the following vulnerability has been resolved: x86/bpf: Fix IP after emitting call depth accounting Adjust the IP passed to emit_patch
so it calculates the correct offset for the CALL instruction if x86_call_depth_emit_accounting
emits code. Otherwise we will skip some instructions and most likely crash.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | linux | < 6.1.106-3 | linux_6.1.106-3_all.deb |
Debian | 11 | all | linux | < 5.10.223-1 | linux_5.10.223-1_all.deb |
Debian | 999 | all | linux | < 6.8.9-1 | linux_6.8.9-1_all.deb |
Debian | 13 | all | linux | < 6.8.9-1 | linux_6.8.9-1_all.deb |