CVE-2024-57909

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-57909
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57909.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-57909
Downstream
Published
2025-01-19T11:52:32.408Z
Modified
2025-11-28T02:34:56.631157Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
iio: light: bh1745: fix information leak in triggered buffer
Details

In the Linux kernel, the following vulnerability has been resolved:

iio: light: bh1745: fix information leak in triggered buffer

The 'scan' local struct is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iioforeachactivechannel() to assign new values.

Initialize the struct to zero before using it to avoid pushing uninitialized information to userspace.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57909.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
eab35358aae705b779a7c8b405474d1290175196
Fixed
1cca2a666e099aa018e5ab385f0a6e01a3053629
Fixed
b62fbe3b8eedd3cf3c9ad0b7cb9f72c3f40815f0

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.12.0
Fixed
6.12.10