CVE-2024-50076
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/10/2024
Last modified:
08/11/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
vt: prevent kernel-infoleak in con_font_get()<br />
<br />
font.data may not initialize all memory spaces depending on the implementation<br />
of vc->vc_sw->con_font_get. This may cause info-leak, so to prevent this, it<br />
is safest to modify it to initialize the allocated memory space to 0, and it<br />
generally does not affect the overall performance of the system.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.3 (including) | 6.6.58 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.5 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1e5a17dc77d8a8bbe67040b32e2ef755901aba44
- https://git.kernel.org/stable/c/23c4cb8a56978e5b1baa171d42e616e316c2039d
- https://git.kernel.org/stable/c/adb1f312f38f0d2c928ceaff089262798cc260b4
- https://git.kernel.org/stable/c/b3959d5eca136e0588f9af3867b34032160cb826
- https://git.kernel.org/stable/c/dc2d5f02636c7587bdd6d1f60fc59c55860b00a4
- https://git.kernel.org/stable/c/dc794e878e6d79f75205be456b1042a289c5759d
- https://git.kernel.org/stable/c/efc67cee700b89ffbdb74a0603a083ec1290ae31
- https://git.kernel.org/stable/c/f956052e00de211b5c9ebaa1958366c23f82ee9e