We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: x86/bpf: Fix IP after emitting call depth accounting Adjust the IP passed to `emit_patch` so it calculates the correct offset for the CALL instruction if `x86_call_depth_emit_accounting` emits code. Otherwise we will skip some instructions and most likely crash.
Reserved 2024-05-17 | Published 2024-05-19 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/3f9d57c771656bfd651e22edcfdb5f60e62542d4
git.kernel.org/...c/81166178cf0a0062a22b1b3b5368183d39577028
git.kernel.org/...c/9d98aa088386aee3db1b7b60b800c0fde0654a4a
Support options