We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: vt: prevent kernel-infoleak in con_font_get() font.data may not initialize all memory spaces depending on the implementation of vc->vc_sw->con_font_get. This may cause info-leak, so to prevent this, it is safest to modify it to initialize the allocated memory space to 0, and it generally does not affect the overall performance of the system.
Reserved 2024-10-21 | Published 2024-10-29 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/efc67cee700b89ffbdb74a0603a083ec1290ae31
git.kernel.org/...c/dc794e878e6d79f75205be456b1042a289c5759d
git.kernel.org/...c/1e5a17dc77d8a8bbe67040b32e2ef755901aba44
git.kernel.org/...c/b3959d5eca136e0588f9af3867b34032160cb826
git.kernel.org/...c/23c4cb8a56978e5b1baa171d42e616e316c2039d
git.kernel.org/...c/dc2d5f02636c7587bdd6d1f60fc59c55860b00a4
git.kernel.org/...c/adb1f312f38f0d2c928ceaff089262798cc260b4
git.kernel.org/...c/f956052e00de211b5c9ebaa1958366c23f82ee9e
Support options