[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20241021235534.e5e55cffca4113ff0081e99b@kernel.org>
Date: Mon, 21 Oct 2024 23:55:34 +0900
From: Masami Hiramatsu (Google) <mhiramat@...nel.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Qiao Ma <mqaio@...ux.alibaba.com>, Steven Rostedt <rostedt@...dmis.org>,
Masami Hiramatsu <mhiramat@...nel.org>, linux-kernel@...r.kernel.org
Subject: [GIT PULL] probes: Fixes for v6.12-rc4
Hi Linus,
Probes fixes for v6.12-rc4:
- uprobe: avoid out-of-bounds memory access of fetching args
Uprobe trace events can cause out-of-bounds memory access when fetching
user-space data which is bigger than one page, because it does not check
the local CPU buffer size when reading the data. This checks the read
data size and cut it down to the local CPU buffer size.
Please pull the latest probes-fixes-v6.12-rc4 tree, which can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace.git
probes-fixes-v6.12-rc4
Tag SHA1: 7490126e350b20cee68a1437bc1a43788e2c4ae5
Head SHA1: 373b9338c9722a368925d83bc622c596896b328e
Qiao Ma (1):
uprobe: avoid out-of-bounds memory access of fetching args
----
kernel/trace/trace_uprobe.c | 9 ++++++---
1 file changed, 6 insertions(+), 3 deletions(-)
--
Masami Hiramatsu (Google) <mhiramat@...nel.org>
Powered by blists - more mailing lists