We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl In the "pmcmd_ioctl" function, three memory objects allocated by kmalloc are initialized by "hcall_get_cpu_state", which are then copied to user space. The initializer is indeed implemented in "acrn_hypercall2" (arch/x86/include/asm/acrn.h). There is a risk of information leakage due to uninitialized bytes.
Reserved 2024-12-29 | Published 2025-04-01 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/4e15cf870d2c748e45d45ffc4d5b1dc1b7d50120
git.kernel.org/...c/524f29d78c9bdeb49f31f5b0376a07d2fc5cf563
git.kernel.org/...c/d7e5031fe3f161c8eb5e84db1540bc4373ed861b
git.kernel.org/...c/1b8f7a2caa7f9cdfd135e3f78eb9d7e36fb95083
git.kernel.org/...c/a4c21b878f0e237f45209a324c903ea7fb05247d
git.kernel.org/...c/819cec1dc47cdeac8f5dd6ba81c1dbee2a68c3bb
Support options