Executive Summary

Informations
Name CVE-2024-57911 First vendor Publication 2025-01-19
Vendor Cve Last vendor Modification 2025-01-23

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer

The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values.

Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57911

Sources (Detail)

https://git.kernel.org/stable/c/006073761888a632c5d6f93e47c41760fa627f77
https://git.kernel.org/stable/c/333be433ee908a53f283beb95585dfc14c8ffb46
https://git.kernel.org/stable/c/74058395b2c63c8a438cf199d09094b640f8c7f4
https://git.kernel.org/stable/c/b0642d9c871aea1f28eb02cd84d60434df594f67
https://git.kernel.org/stable/c/ea703cda36da0dacb9a2fd876370003197d8a019
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2025-01-23 21:20:32
  • Multiple Updates
2025-01-19 17:20:28
  • First insertion