On Fri, 2025-01-24 at 13:25 +0530, shivam tiwari wrote: > Fix Heap Buffer Overflow in btf_ext_parse_info Function > This pull request addresses a heap-buffer-overflow vulnerability detected in the btf_ext_parse_info function located in src/btf.c. The issue arises at line 3001, where an out-of-bounds memory access occurs, potentially leading to undefined behavior and memory corruption. This can happen if the function accesses data that exceeds the allocated buffer size without sufficient bounds checking. > Fix: > * Added additional checks to ensure the buffer accesses remain within bounds. > * Improved memory validation to prevent overflows and ensure the integrity of the data being processed. > This change mitigates the risk of a heap buffer overflow, improving the safety of the code and ensuring that all memory accesses are within valid ranges. > > For further details, refer to the issue link: OSS-Fuzz Issue 388905046 https://issues.oss-fuzz.com/issues/388905046 ; > attached below updated code file > If you have any specific resolution code or further details to include in the PR, please let me know. Hi Shivam, Please take a look at kernel contribution guidlines: https://www.kernel.org/doc/html/latest/process/submitting-patches.html Please consider sending a patch in accordance to these guidelines.