In the Linux kernel, the following vulnerability has been resolved: vt: prevent kernel-infoleak in con_font_get() font.data may not initialize all memory spaces depending on the implementation of vc->vc_sw->con_font_get. This may cause info-leak, so to prevent this, it is safest to modify it to initialize the allocated memory space to 0, and it generally does not affect the overall performance of the system.
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | None |
Availability Impact | None |
Epss Score | 0.00098 |
---|---|
Epss Percentile | 0.42276 |
ریسک پائین:: این آسیب پذیری احتمال ارائه Exploit پائینی دارد. به روز رسانی و نظارت معمولی را لحاظ نمائید.
CPE | Vendor | Product | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | linux | linux_kernel | * | * |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | linux | linux_kernel | * | * |
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | linux | linux_kernel | 6.12 | rc2 |
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | linux | linux_kernel | 6.12 | rc3 |
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | linux | linux_kernel | 6.12 | rc1 |