| Summary | In the Linux kernel, the following vulnerability has been resolved: arm64: probes: Fix uprobes for big-endian kernels The arm64 uprobes code is broken for big-endian kernels as it doesn't * The kernel may may erroneously reject probing an instruction which can * The kernel may erroneously erroneously permit stepping an * The kernel may erroneously simulate instruction incorrectly dur to The endianness mismatch isn't caught by the compiler or sparse because: * The arch_uprobe::{insn,ixol} fields are encoded as arrays of u8, so * While the uprobe_opcode_t type is an alias for __le32, both Fix this by changing the arch_uprobe::{insn,ixol} fields to __le32 and At the same time, remove MAX_UINSN_BYTES and consistently use Tested with the following: | #include <stdio.h> .... where the adrp_self() function was compiled to: | 00000000004007e0 <adrp_self>: Before this patch, the ADRP is not recognized, and is assumed to be | # ./adrp-self After this patch, the ADRP is correctly recognized and simulated: | # ./adrp-self |
|---|---|
| Publication Date | Nov. 8, 2024, 3:15 p.m. |
| Registration Date | Nov. 9, 2024, 5 a.m. |
| Last Update | Nov. 9, 2024, 1:15 a.m. |
| Title | Linux の Linux Kernel における脆弱性 |
|---|---|
| Summary | Linux の Linux Kernel には、不特定の脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Oct. 9, 2024, midnight |
| Registration Date | Dec. 2, 2024, 12:16 p.m. |
| Last Update | Aug. 21, 2025, 1:36 p.m. |
| Linux |
| Linux Kernel 4.10 以上 4.19.323 未満 |
| Linux Kernel 4.20 以上 5.4.285 未満 |
| Linux Kernel 5.11 以上 5.15.170 未満 |
| Linux Kernel 5.16 以上 6.1.115 未満 |
| Linux Kernel 5.5 以上 5.10.229 未満 |
| Linux Kernel 6.12 |
| Linux Kernel 6.2 以上 6.6.58 未満 |
| Linux Kernel 6.7 以上 6.11.5 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2024年12月02日] 掲載 | Dec. 2, 2024, 9:58 a.m. |
| 2 | [2025年08月21日] 参考情報:JVN (JVNVU#92169998) を追加 参考情報:ICS-CERT ADVISORY (ICSA-25-226-07) を追加 |
Aug. 21, 2025, 1:35 p.m. |