Information Leak in Linux Kernel's Triggered Buffer Management
CVE-2024-57911

7.1HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
19 January 2025

Summary

A vulnerability exists in the Linux kernel's triggered buffer management that allows an information leak through uninitialized memory. The issue arises from the allocation of the 'data' array using kmalloc() without setting values for inactive channels. This oversight can result in exposing uninitialized data to user space, potentially compromising system security. The recommended fix is to utilize kzalloc for memory allocation, ensuring that the allocated memory is zeroed and does not expose sensitive information.

Affected Version(s)

Linux 415f792447572ef1949a3cef5119bbce8cc66373 < 03fa47621bf8fcbf5994c5716021527853f9af3d

Linux 415f792447572ef1949a3cef5119bbce8cc66373

Linux 415f792447572ef1949a3cef5119bbce8cc66373 < 006073761888a632c5d6f93e47c41760fa627f77

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.