Логотип exploitDog
bind:"BDU:2025-02792" OR bind:"CVE-2024-57911"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-02792" OR bind:"CVE-2024-57911"

Количество 12

Количество 12

fstec логотип

BDU:2025-02792

6 месяцев назад

Уязвимость функции iio_simple_dummy_trigger_h() драйвера drivers/iio/dummy/iio_simple_dummy_buffer.c поддержки драйверов-заглушек IIO ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации.

CVSS3: 7.1
EPSS: Низкий
ubuntu логотип

CVE-2024-57911

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2024-57911

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2024-57911

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.

CVSS3: 7.1
EPSS: Низкий
msrc логотип

CVE-2024-57911

около 2 месяцев назад

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2024-57911

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-2w6v-cv9c-qwv2

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.

CVSS3: 7.1
EPSS: Низкий
redos логотип

ROS-20250514-01

около 1 месяца назад

Множественные уязвимости kernel-lt

CVSS3: 8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0428-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0557-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0499-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0289-1

5 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-02792

Уязвимость функции iio_simple_dummy_trigger_h() драйвера drivers/iio/dummy/iio_simple_dummy_buffer.c поддержки драйверов-заглушек IIO ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации.

CVSS3: 7.1
0%
Низкий
6 месяцев назад
ubuntu логотип
CVE-2024-57911

In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.

CVSS3: 7.1
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2024-57911

In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.

CVSS3: 6
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2024-57911

In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.

CVSS3: 7.1
0%
Низкий
5 месяцев назад
msrc логотип
CVSS3: 7.1
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2024-57911

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 7.1
0%
Низкий
5 месяцев назад
github логотип
GHSA-2w6v-cv9c-qwv2

In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.

CVSS3: 7.1
0%
Низкий
5 месяцев назад
redos логотип
ROS-20250514-01

Множественные уязвимости kernel-lt

CVSS3: 8
около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0428-1

Security update for the Linux Kernel

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0557-1

Security update for the Linux Kernel

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0499-1

Security update for the Linux Kernel

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0289-1

Security update for the Linux Kernel

5 месяцев назад

Уязвимостей на страницу