From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: uprobes: fix kernel info leak via "[uprobes]" vma - Description: The function maps uninitialized pages (allocated by ) into userspace. On certain architectures (e.g., x86), even without permission, results in the same of , although this is not critical since debuggers can still read this memory. 2. Patch Code: - File: - Code Changes: - Removed: - Added: - Added: - Added: 3. Patch Context: - Patch Author: Oleg Nesterov - Patch Submission Date: 2024-10-07 19:46:01 +0200 - Patch Submitter: Greg Kroah-Hartman - Patch Link: https://lore.kernel.org/all/20240929162047.GA12611@redhat.com/ 4. Vulnerability Fixed by the Patch: - Reporter: Will Deacon - Fixed Commit ID: d4b3b6384f98 ("uprobes/core: Allocate XOL slots for uprobes use") - Fixed Vulnerability Description: uprobes/core: Allocate XOL slots for uprobes use 5. Patch Contributors: - Contributor: Masami Hiramatsu (Google) - Contributor: Sasha Levin 6. Patch Signatures: - Signer: Oleg Nesterov - Signer: Masami Hiramatsu (Google) - Signer: Sasha Levin This information helps us understand the background of the patch, the vulnerability it fixes, the code changes introduced, and the contributors involved.