In the Linux kernel, the following vulnerability has been resolved:
bpf: Guard against accessing NULL ptregs in bpfgettaskstack()
taskptregs() can return NULL on powerpc for kernel threads. This is then used in _bpfgetstack() to check for user mode, resulting in a kernel oops. Guard against this by checking return value of taskpt_regs() before trying to obtain the call chain.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48770.json"
}[
{
"signature_version": "v1",
"digest": {
"line_hashes": [
"87476905145350513683560255652796726364",
"184563465471568293314723306481547783027",
"216289166173083625395317901019415917029",
"258727836920159538513570154868798752349",
"127151045416202207401729971754934433732",
"42362273536117570824466612198410763027",
"3013808377807609457523896484134133893",
"114898225374027435598489999633558752621"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "kernel/bpf/stackmap.c"
},
"signature_type": "Line",
"id": "CVE-2022-48770-3083c7a5",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b82ef4985a6d05e80f604624332430351df7b79a"
},
{
"signature_version": "v1",
"digest": {
"function_hash": "235962930155882955712540234576597042606",
"length": 287.0
},
"deprecated": false,
"target": {
"file": "kernel/bpf/stackmap.c",
"function": "BPF_CALL_4"
},
"signature_type": "Function",
"id": "CVE-2022-48770-45f975ab",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b82ef4985a6d05e80f604624332430351df7b79a"
},
{
"signature_version": "v1",
"digest": {
"function_hash": "235962930155882955712540234576597042606",
"length": 287.0
},
"deprecated": false,
"target": {
"file": "kernel/bpf/stackmap.c",
"function": "BPF_CALL_4"
},
"signature_type": "Function",
"id": "CVE-2022-48770-82bab482",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bcd484587b3b3092e448d27dc369e347e1810c3"
},
{
"signature_version": "v1",
"digest": {
"line_hashes": [
"87476905145350513683560255652796726364",
"184563465471568293314723306481547783027",
"216289166173083625395317901019415917029",
"258727836920159538513570154868798752349",
"127151045416202207401729971754934433732",
"42362273536117570824466612198410763027",
"3013808377807609457523896484134133893",
"114898225374027435598489999633558752621"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "kernel/bpf/stackmap.c"
},
"signature_type": "Line",
"id": "CVE-2022-48770-97d545e5",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b992f01e66150fc5e90be4a96f5eb8e634c8249e"
},
{
"signature_version": "v1",
"digest": {
"function_hash": "235962930155882955712540234576597042606",
"length": 287.0
},
"deprecated": false,
"target": {
"file": "kernel/bpf/stackmap.c",
"function": "BPF_CALL_4"
},
"signature_type": "Function",
"id": "CVE-2022-48770-f237fdf3",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b992f01e66150fc5e90be4a96f5eb8e634c8249e"
},
{
"signature_version": "v1",
"digest": {
"line_hashes": [
"87476905145350513683560255652796726364",
"184563465471568293314723306481547783027",
"216289166173083625395317901019415917029",
"258727836920159538513570154868798752349",
"127151045416202207401729971754934433732",
"42362273536117570824466612198410763027",
"3013808377807609457523896484134133893",
"114898225374027435598489999633558752621"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "kernel/bpf/stackmap.c"
},
"signature_type": "Line",
"id": "CVE-2022-48770-f9557860",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bcd484587b3b3092e448d27dc369e347e1810c3"
}
]