In the Linux kernel, the following vulnerability has been resolved:
vt: prevent kernel-infoleak in confontget()
font.data may not initialize all memory spaces depending on the implementation of vc->vcsw->confont_get. This may cause info-leak, so to prevent this, it is safest to modify it to initialize the allocated memory space to 0, and it generally does not affect the overall performance of the system.
[
{
"target": {
"file": "drivers/tty/vt/vt.c"
},
"digest": {
"line_hashes": [
"100414814895425241234654320566860331369",
"145511507251845467529760619264250829453",
"29257722401210383079895433906573772380",
"5709379295795640169009345477059095065"
],
"threshold": 0.9
},
"id": "CVE-2024-50076-2475baca",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f956052e00de211b5c9ebaa1958366c23f82ee9e",
"signature_version": "v1",
"signature_type": "Line"
},
{
"target": {
"file": "drivers/tty/vt/vt.c"
},
"digest": {
"line_hashes": [
"100414814895425241234654320566860331369",
"145511507251845467529760619264250829453",
"29257722401210383079895433906573772380",
"5709379295795640169009345477059095065"
],
"threshold": 0.9
},
"id": "CVE-2024-50076-360984a1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc2d5f02636c7587bdd6d1f60fc59c55860b00a4",
"signature_version": "v1",
"signature_type": "Line"
},
{
"target": {
"file": "drivers/tty/vt/vt.c"
},
"digest": {
"line_hashes": [
"242130181835221813459055035435495687243",
"7778235160844507240166051420450556714",
"232770356909776262340629390316461480462",
"124782018486434925323329860996280587663"
],
"threshold": 0.9
},
"id": "CVE-2024-50076-d2da96af",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc794e878e6d79f75205be456b1042a289c5759d",
"signature_version": "v1",
"signature_type": "Line"
},
{
"target": {
"file": "drivers/tty/vt/vt.c"
},
"digest": {
"line_hashes": [
"242130181835221813459055035435495687243",
"7778235160844507240166051420450556714",
"232770356909776262340629390316461480462",
"124782018486434925323329860996280587663"
],
"threshold": 0.9
},
"id": "CVE-2024-50076-d5d859f2",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1e5a17dc77d8a8bbe67040b32e2ef755901aba44",
"signature_version": "v1",
"signature_type": "Line"
},
{
"target": {
"file": "drivers/tty/vt/vt.c"
},
"digest": {
"line_hashes": [
"242130181835221813459055035435495687243",
"7778235160844507240166051420450556714",
"232770356909776262340629390316461480462",
"124782018486434925323329860996280587663"
],
"threshold": 0.9
},
"id": "CVE-2024-50076-fa6220ff",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@23c4cb8a56978e5b1baa171d42e616e316c2039d",
"signature_version": "v1",
"signature_type": "Line"
}
]