"value":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix bpf_get_smp_processor_id() on !CONFIG_SMP\n\nOn x86-64 calling bpf_get_smp_processor_id() in a kernel with CONFIG_SMP\ndisabled can trigger the following bug, as pcpu_hot is unavailable:\n\n [ 8.471774] BUG: unable to handle page fault for address: 00000000936a290c\n [ 8.471849] #PF: supervisor read access in kernel mode\n [ 8.471881] #PF: error_code(0x0000) - not-present page\n\nFix by inlining a return 0 in the !CONFIG_SMP case."
"value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Corregir bpf_get_smp_processor_id() en !CONFIG_SMP En x86-64, llamar a bpf_get_smp_processor_id() en un kernel con CONFIG_SMP deshabilitado puede provocar el siguiente error, ya que pcpu_hot no est\u00e1 disponible: [ 8.471774] ERROR: no se puede gestionar el error de p\u00e1gina para la direcci\u00f3n: 00000000936a290c [ 8.471849] #PF: acceso de lectura de supervisor en modo kernel [ 8.471881] #PF: error_code(0x0000) - p\u00e1gina no presente Corregir incrustando un retorno 0 en el caso de !CONFIG_SMP."