We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: riscv: process: fix kernel info leakage thread_struct's s[12] may contain random kernel memory content, which may be finally leaked to userspace. This is a security hole. Fix it by clearing the s[12] array in thread_struct when fork. As for kthread case, it's better to clear the s[12] array as well.
Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/c4601d30f7d989b4f354df899ab85b5f7a750d30
git.kernel.org/...c/c5c0b3167537793a7cf936fb240366eefd2fc7fb
git.kernel.org/...c/e56d18a976dda653194218df6d40d8122c775712
git.kernel.org/...c/cc36c7fa5d9384602529ba3eea8c5daee7be4dbc
git.kernel.org/...c/358a68f98304b40b201ba5afe94c20355aa3dc68
git.kernel.org/...c/6510c78490c490a6636e48b61eeaa6fb65981f4b
Support options