{"vulnerability": "CVE-2024-57909", "sightings": [{"uuid": "d57256e6-21ee-43b2-872e-15db4791627f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57909", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2343", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57909\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\niio: light: bh1745: fix information leak in triggered buffer\n\nThe 'scan' local struct is used to push data to user space from a\ntriggered buffer, but it does not set values for inactive channels, as\nit only uses iio_for_each_active_channel() to assign new values.\n\nInitialize the struct to zero before using it to avoid pushing\nuninitialized information to userspace.\n\ud83d\udccf Published: 2025-01-19T11:52:32.408Z\n\ud83d\udccf Modified: 2025-01-19T11:52:32.408Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/1cca2a666e099aa018e5ab385f0a6e01a3053629\n2. https://git.kernel.org/stable/c/b62fbe3b8eedd3cf3c9ad0b7cb9f72c3f40815f0", "creation_timestamp": "2025-01-19T11:58:40.000000Z"}, {"uuid": "0553f814-7bff-4c29-9c5d-2dad3abf747c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57909", "type": "seen", "source": "https://t.me/cvedetector/15866", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57909 - \"Linux IIO light bh1745 Information Leak\"\", \n  \"Content\": \"CVE ID : CVE-2024-57909 \nPublished : Jan. 19, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \niio: light: bh1745: fix information leak in triggered buffer  \n  \nThe 'scan' local struct is used to push data to user space from a  \ntriggered buffer, but it does not set values for inactive channels, as  \nit only uses iio_for_each_active_channel() to assign new values.  \n  \nInitialize the struct to zero before using it to avoid pushing  \nuninitialized information to userspace. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-19T13:59:19.000000Z"}, {"uuid": "f9da772b-0169-4959-ba57-4e7dc90c1b23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57909", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lg3shhlr3d2h", "content": "", "creation_timestamp": "2025-01-19T12:15:52.662731Z"}, {"uuid": "146161e0-5c66-4903-b551-7f968d3193b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57909", "type": "seen", "source": "Telegram/d_5nGhf0MWAPcY54XckF-b5CGAi9Nvdf7TVg6UxIZUirxEs1", "content": "", "creation_timestamp": "2025-02-18T21:11:31.000000Z"}]}