CVE-2024-57911

In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*

History

03 Feb 2025, 14:51

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CWE CWE-908
References () https://git.kernel.org/stable/c/006073761888a632c5d6f93e47c41760fa627f77 - () https://git.kernel.org/stable/c/006073761888a632c5d6f93e47c41760fa627f77 - Patch
References () https://git.kernel.org/stable/c/03fa47621bf8fcbf5994c5716021527853f9af3d - () https://git.kernel.org/stable/c/03fa47621bf8fcbf5994c5716021527853f9af3d - Patch
References () https://git.kernel.org/stable/c/333be433ee908a53f283beb95585dfc14c8ffb46 - () https://git.kernel.org/stable/c/333be433ee908a53f283beb95585dfc14c8ffb46 - Patch
References () https://git.kernel.org/stable/c/74058395b2c63c8a438cf199d09094b640f8c7f4 - () https://git.kernel.org/stable/c/74058395b2c63c8a438cf199d09094b640f8c7f4 - Patch
References () https://git.kernel.org/stable/c/b0642d9c871aea1f28eb02cd84d60434df594f67 - () https://git.kernel.org/stable/c/b0642d9c871aea1f28eb02cd84d60434df594f67 - Patch
References () https://git.kernel.org/stable/c/e1c1e8c05010103c9c9ea3e9c4304b0b7e2c8e4a - () https://git.kernel.org/stable/c/e1c1e8c05010103c9c9ea3e9c4304b0b7e2c8e4a - Patch
References () https://git.kernel.org/stable/c/ea703cda36da0dacb9a2fd876370003197d8a019 - () https://git.kernel.org/stable/c/ea703cda36da0dacb9a2fd876370003197d8a019 - Patch

02 Feb 2025, 11:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/03fa47621bf8fcbf5994c5716021527853f9af3d -
  • () https://git.kernel.org/stable/c/e1c1e8c05010103c9c9ea3e9c4304b0b7e2c8e4a -

23 Jan 2025, 17:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/006073761888a632c5d6f93e47c41760fa627f77 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: dummy: iio_simply_dummy_buffer: corrige la fuga de información en el búfer activado La matriz 'data' se asigna a través de kmalloc() y se utiliza para enviar datos al espacio del usuario desde un búfer activado, pero no establece valores para canales inactivos, ya que solo utiliza iio_for_each_active_channel() para asignar nuevos valores. Utilice kzalloc para la asignación de memoria para evitar enviar información no inicializada al espacio del usuario.

19 Jan 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-19 12:15

Updated : 2025-02-03 14:51


NVD link : CVE-2024-57911

Mitre link : CVE-2024-57911

CVE.ORG link : CVE-2024-57911


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-908

Use of Uninitialized Resource