First published: Sun Jan 19 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: iio: pressure: zpa2326: fix information leak in triggered buffer The 'sample' local struct is used to push data to user space from a triggered buffer, but it has a hole between the temperature and the timestamp (u32 pressure, u16 temperature, GAP, u64 timestamp). This hole is never initialized. Initialize the struct to zero before using it to avoid pushing uninitialized information to userspace.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | ||
Linux Kernel | >=4.9<6.1.125 | |
Linux Kernel | >=6.2<6.6.72 | |
Linux Kernel | >=6.7<6.12.10 | |
Linux Kernel | =6.13-rc1 | |
Linux Kernel | =6.13-rc2 | |
Linux Kernel | =6.13-rc3 | |
Linux Kernel | =6.13-rc4 | |
Linux Kernel | =6.13-rc5 | |
Linux Kernel | =6.13-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57912 has been classified as a medium severity vulnerability due to the potential for information leakage.
To fix CVE-2024-57912, update your Linux kernel to the latest version where the vulnerability has been patched.
CVE-2024-57912 affects the Linux kernel, specifically the iio pressure driver zpa2326.
CVE-2024-57912 is an information leakage vulnerability in the Linux kernel related to the handling of triggered buffers.
CVE-2024-57912 is not a remote exploit but can potentially be exploited locally by a user with access to the affected system.