A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:3618 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:3627 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:9315 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:7526 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-0340 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2257406 | patch third party advisory issue tracking |
https://lore.kernel.org/lkml/5kn47peabxjrptkqa6dwtyus35ahf4pcj4qm4pumse33kxqpjw@mec4se5relrc/T/ | patch mailing list |
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html | |
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html |