VYPR
High severity7.1NVD Advisory· Published Sep 27, 2024· Updated May 12, 2026

CVE-2024-46865

CVE-2024-46865

Description

In the Linux kernel, the following vulnerability has been resolved:

fou: fix initialization of grc

The grc must be initialize first. There can be a condition where if fou is NULL, goto out will be executed and grc would be used uninitialized.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A Linux kernel FOU netlink handler can use uninitialized memory for 'grc' when 'fou' is NULL, leading to potential information disclosure or crash.

Vulnerability

Description

CVE-2024-46865 is a bug in the Linux kernel's Foo-over-UDP (FOU) netlink implementation. The root cause is a missing initialization of the grc structure. In the fou_nl_cmd_get_port() or similar handler, if the fou pointer is NULL (indicating an error or missing FOU configuration), the code jumps to an out label that uses grc without having initialized it. This results in the kernel leaking uninitialized kernel stack memory to user space.

Exploitation

The vulnerability is exploitable by any local user who can send specially crafted netlink messages to the AF_NETLINK socket with the NETLINK_FOU protocol. No special privileges (beyond CAP_NET_ADMIN in some configurations) are required. The attacker triggers the error path where fou is NULL, causing the kernel to copy uninitialized grc data back to the user.

Impact

Successful exploitation allows a local attacker to read kernel stack memory, potentially leaking sensitive information such as addresses of kernel objects, credentials, or other secrets. This could facilitate privilege escalation or other attacks. The vulnerability also has the potential to cause a kernel crash (NULL pointer dereference or use of uninitialized data) resulting in a denial of service.

Mitigation

The fix was included in the Linux kernel mainline. Users should apply the patch or update to a kernel version containing the fix. The referenced Siemens advisory [1] notes that affected SIMATIC S7-1500 TM MFP products running the Linux subsystem may be vulnerable and recommends updating the kernel or applying vendor patches.

[1]: https://cert-portal.siemens.com/productcert/html/ssa-265688.html

References
  1. SSA-265688

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

132

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.