Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: iio: adc: ti-ads1119: fix information leak in triggered buffer The 'scan' local struct is used to push data to user space from a triggered buffer, but it has a hole between the sample (unsigned int) and the timestamp. This hole is never initialized. Initialize the struct to zero before using it to avoid pushing uninitialized information to userspace.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.11, < 6.12.10 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/2f1687cca911a2f294313c762e0646cd9e7be8ccPatch
- https://git.kernel.org/stable/c/75f339d3ecd38cb1ce05357d647189d4a7f7ed08Patch
FAQ
What is CVE-2024-57905?
CVE-2024-57905 is a vulnerability with a CVSS score of 7.1 (HIGH). In the Linux kernel, the following vulnerability has been resolved: iio: adc: ti-ads1119: fix information leak in triggered buffer The 'scan' local struct is used to push data to user space from a t...
How severe is CVE-2024-57905?
CVE-2024-57905 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-57905?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.