[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id:
<176800320632.431515.385277926966372587.git-patchwork-notify@kernel.org>
Date: Sat, 10 Jan 2026 00:00:06 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Varun R Mallya <varunrmallya@...il.com>
Cc: andrii@...nel.org, alan.maguire@...cle.com, ast@...nel.org,
daniel@...earbox.net, bpf@...r.kernel.org, linux-kernel@...r.kernel.org,
harrisonmichaelgreen@...il.com
Subject: Re: [PATCH bpf] libbpf: Fix OOB read in btf_dump_get_bitfield_value
Hello:
This patch was applied to bpf/bpf-next.git (master)
by Andrii Nakryiko <andrii@...nel.org>:
On Wed, 7 Jan 2026 05:05:27 +0530 you wrote:
> When dumping bitfield data, btf_dump_get_bitfield_value() reads data
> based on the underlying type's size (t->size). However, it does not
> verify that the provided data buffer (data_sz) is large enough to
> contain these bytes.
>
> If btf_dump__dump_type_data() is called with a buffer smaller than
> the type's size, this leads to an out-of-bounds read. This was
> confirmed by AddressSanitizer in the linked issue.
>
> [...]
Here is the summary with links:
- [bpf] libbpf: Fix OOB read in btf_dump_get_bitfield_value
https://git.kernel.org/bpf/bpf-next/c/5714ca8cba5e
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists