vulnerability
Red Hat: CVE-2024-39499: kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver() (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:M/Au:M/C:C/I:N/A:N) | Jul 12, 2024 | Sep 25, 2024 | Mar 27, 2026 |
Severity
4
CVSS
(AV:L/AC:M/Au:M/C:C/I:N/A:N)
Published
Jul 12, 2024
Added
Sep 25, 2024
Modified
Mar 27, 2026
Description
In the Linux kernel, the following vulnerability has been resolved:
vmci: prevent speculation leaks by sanitizing event in event_deliver()
Coverity spotted that event_msg is controlled by user-space,
event_msg->event_data.event is passed to event_deliver() and used
as an index without sanitization.
This change ensures that the event index is sanitized to mitigate any
possibility of speculative information leaks.
This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.
Only compile tested, no access to HW.
Solutions
redhat-upgrade-kernelredhat-upgrade-kernel-rt
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.