CVE-2024-57907

In the Linux kernel, the following vulnerability has been resolved: iio: adc: rockchip_saradc: fix information leak in triggered buffer The 'data' local struct is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Initialize the struct to zero before using it to avoid pushing uninitialized information to userspace.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Feb 2025, 13:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/85a9c98a5e0f22d911b00077d751e34fff1401aa - () https://git.kernel.org/stable/c/85a9c98a5e0f22d911b00077d751e34fff1401aa - Patch
References () https://git.kernel.org/stable/c/38724591364e1e3b278b4053f102b49ea06ee17c - () https://git.kernel.org/stable/c/38724591364e1e3b278b4053f102b49ea06ee17c - Patch
References () https://git.kernel.org/stable/c/8193941bc4fe7247ff13233f328aea709f574554 - () https://git.kernel.org/stable/c/8193941bc4fe7247ff13233f328aea709f574554 - Patch
References () https://git.kernel.org/stable/c/7a07fb80ea886e9134284a27d0155cca7649e293 - () https://git.kernel.org/stable/c/7a07fb80ea886e9134284a27d0155cca7649e293 - Patch
References () https://git.kernel.org/stable/c/64b79afdca7b27a768c7d3716b7f4deb1d6b955c - () https://git.kernel.org/stable/c/64b79afdca7b27a768c7d3716b7f4deb1d6b955c - Patch
References () https://git.kernel.org/stable/c/5a95fbbecec7a34bbad5dcc3156700b8711d53c4 - () https://git.kernel.org/stable/c/5a95fbbecec7a34bbad5dcc3156700b8711d53c4 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CWE CWE-908
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*

02 Feb 2025, 11:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/85a9c98a5e0f22d911b00077d751e34fff1401aa -

23 Jan 2025, 17:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/7a07fb80ea886e9134284a27d0155cca7649e293 -
  • () https://git.kernel.org/stable/c/64b79afdca7b27a768c7d3716b7f4deb1d6b955c -

19 Jan 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-19 12:15

Updated : 2025-02-18 13:40


NVD link : CVE-2024-57907

Mitre link : CVE-2024-57907


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-908

Use of Uninitialized Resource