CVE-2024-56557
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
27/12/2024
Last modified:
18/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer<br />
<br />
The AD7923 was updated to support devices with 8 channels, but the size<br />
of tx_buf and ring_xfer was not increased accordingly, leading to a<br />
potential buffer overflow in ad7923_update_scan_mode().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.6 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/00663d3e000c31d0d49ef86a809f5c107c2d09cd
- https://git.kernel.org/stable/c/218ecc35949129171ca39bcc0d407c8dc4cd0bbc
- https://git.kernel.org/stable/c/3a4187ec454e19903fd15f6e1825a4b84e59a4cd
- https://git.kernel.org/stable/c/6e4d236d9c4b38571c394d3ab6e85dfb71c33ed3
- https://git.kernel.org/stable/c/e5cac32721997cb8bcb208a29f4598b3faf46338
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



