{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-57906","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-01-19T11:50:08.372Z","datePublished":"2025-01-19T11:52:30.365Z","dateUpdated":"2025-11-03T20:55:31.340Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T13:01:34.404Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ti-ads8688: fix information leak in triggered buffer\n\nThe 'buffer' local array is used to push data to user space from a\ntriggered buffer, but it does not set values for inactive channels, as\nit only uses iio_for_each_active_channel() to assign new values.\n\nInitialize the array to zero before using it to avoid pushing\nuninitialized information to userspace."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/iio/adc/ti-ads8688.c"],"versions":[{"version":"26aa12ef64ee997d293659bbf645c6df99fb73e5","lessThan":"1c80a0985a9a14f33dbf63cd703ca010f094f878","status":"affected","versionType":"git"},{"version":"c923e9effe50b0a83e74e1940afbecef5456bfda","lessThan":"3bf8d1e87939b8a19c9b738564fddf5b73322f2f","status":"affected","versionType":"git"},{"version":"61fa5dfa5f52806f5ce37a0ba5712c271eb22f98","lessThan":"aae96738006840533cf147ffd5f41830987f21c5","status":"affected","versionType":"git"},{"version":"61fa5dfa5f52806f5ce37a0ba5712c271eb22f98","lessThan":"ebe2672bc42a0dfe31bb539f8ce79d024aa7e46d","status":"affected","versionType":"git"},{"version":"61fa5dfa5f52806f5ce37a0ba5712c271eb22f98","lessThan":"455df95eb8f24a37abc549d6738fc8ee07eb623b","status":"affected","versionType":"git"},{"version":"61fa5dfa5f52806f5ce37a0ba5712c271eb22f98","lessThan":"485570ed82b7a6bb109fa1d0a79998e21f7f4c73","status":"affected","versionType":"git"},{"version":"61fa5dfa5f52806f5ce37a0ba5712c271eb22f98","lessThan":"2a7377ccfd940cd6e9201756aff1e7852c266e69","status":"affected","versionType":"git"},{"version":"91664385e6c49f1e961e822f2d024776ac22102a","status":"affected","versionType":"git"},{"version":"a65024fc5754f2fca73541373a2502bef603565b","status":"affected","versionType":"git"},{"version":"3563bb70d6baa0a5e8082397e13f62f26053c04d","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/iio/adc/ti-ads8688.c"],"versions":[{"version":"5.14","status":"affected"},{"version":"0","lessThan":"5.14","status":"unaffected","versionType":"semver"},{"version":"5.4.290","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.234","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.177","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.125","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.72","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.10","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.132","versionEndExcluding":"5.4.290"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.50","versionEndExcluding":"5.10.234"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"5.15.177"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"6.1.125"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"6.6.72"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"6.12.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"6.13"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.198"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12.17"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/1c80a0985a9a14f33dbf63cd703ca010f094f878"},{"url":"https://git.kernel.org/stable/c/3bf8d1e87939b8a19c9b738564fddf5b73322f2f"},{"url":"https://git.kernel.org/stable/c/aae96738006840533cf147ffd5f41830987f21c5"},{"url":"https://git.kernel.org/stable/c/ebe2672bc42a0dfe31bb539f8ce79d024aa7e46d"},{"url":"https://git.kernel.org/stable/c/455df95eb8f24a37abc549d6738fc8ee07eb623b"},{"url":"https://git.kernel.org/stable/c/485570ed82b7a6bb109fa1d0a79998e21f7f4c73"},{"url":"https://git.kernel.org/stable/c/2a7377ccfd940cd6e9201756aff1e7852c266e69"}],"title":"iio: adc: ti-ads8688: fix information leak in triggered buffer","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.1,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2024-57906","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2025-10-01T19:53:43.080798Z"}}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-908","description":"CWE-908 Use of Uninitialized Resource"}]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-01T19:57:16.648Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:55:31.340Z"}}]}}