From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: uprobes: fix kernel info leak via "[uprobes]" vma - Description: The function maps uninitialized pages into userspace. On certain architectures (x86), even without VM_READ permission, VM_EXEC results in the same pgprot_t (VM_EXEC 2. Patch Code: - Patch Content: In , the allocation of is changed from to . 3. Patch Context: - Patch Location: Within the function. - Patch Impact: Fixes the kernel information leak issue. 4. Patch Author: - Author: Oleg Nesterov - Commit Time: 2024-10-07 19:46:01 +0200 5. Patch Status: - Status: Merged into upstream kernel. 6. Patch Link: - Link: https://lore.kernel.org/all/20240929162047.GA12611@redhat.com/ 7. Patch Report: - Reporter: Will Deacon - Fixed Issue: d4b3b6384f98 ("uprobes/core: Allocate XOL slots for uprobes use") 8. Related Patch: - Related Patch: 5a306c8641f47383ab328f58c9486b49ff9ff3d (diff) - Related Patch Link: https://lore.kernel.org/all/20240929162047.GA12611@redhat.com/ This information helps us understand the vulnerability's background, the fix process, and the details of the associated patch.