In the Linux kernel, the following vulnerability has been resolved:
bpf: Guard against accessing NULL ptregs in bpfgettaskstack()
taskptregs() can return NULL on powerpc for kernel threads. This is then used in _bpfgetstack() to check for user mode, resulting in a kernel oops. Guard against this by checking return value of taskpt_regs() before trying to obtain the call chain.
{ "vanir_signatures": [ { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "87476905145350513683560255652796726364", "184563465471568293314723306481547783027", "216289166173083625395317901019415917029", "258727836920159538513570154868798752349", "127151045416202207401729971754934433732", "42362273536117570824466612198410763027", "3013808377807609457523896484134133893", "114898225374027435598489999633558752621" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b82ef4985a6d05e80f604624332430351df7b79a", "deprecated": false, "target": { "file": "kernel/bpf/stackmap.c" }, "signature_type": "Line", "id": "CVE-2022-48770-3083c7a5" }, { "signature_version": "v1", "digest": { "length": 287.0, "function_hash": "235962930155882955712540234576597042606" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b82ef4985a6d05e80f604624332430351df7b79a", "deprecated": false, "target": { "file": "kernel/bpf/stackmap.c", "function": "BPF_CALL_4" }, "signature_type": "Function", "id": "CVE-2022-48770-45f975ab" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "87476905145350513683560255652796726364", "184563465471568293314723306481547783027", "216289166173083625395317901019415917029", "258727836920159538513570154868798752349", "127151045416202207401729971754934433732", "42362273536117570824466612198410763027", "3013808377807609457523896484134133893", "114898225374027435598489999633558752621" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ff6bdc205fd0a83bd365405d4e31fb5905826996", "deprecated": false, "target": { "file": "kernel/bpf/stackmap.c" }, "signature_type": "Line", "id": "CVE-2022-48770-5ec2ccb8" }, { "signature_version": "v1", "digest": { "length": 287.0, "function_hash": "235962930155882955712540234576597042606" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ff6bdc205fd0a83bd365405d4e31fb5905826996", "deprecated": false, "target": { "file": "kernel/bpf/stackmap.c", "function": "BPF_CALL_4" }, "signature_type": "Function", "id": "CVE-2022-48770-c32742cb" } ] }