๐Ÿ” CVE Alert

CVE-2024-57911

HIGH 7.1

iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 19, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
415f792447572ef1949a3cef5119bbce8cc66373 < 03fa47621bf8fcbf5994c5716021527853f9af3d 415f792447572ef1949a3cef5119bbce8cc66373 < e1c1e8c05010103c9c9ea3e9c4304b0b7e2c8e4a 415f792447572ef1949a3cef5119bbce8cc66373 < 006073761888a632c5d6f93e47c41760fa627f77 415f792447572ef1949a3cef5119bbce8cc66373 < b0642d9c871aea1f28eb02cd84d60434df594f67 415f792447572ef1949a3cef5119bbce8cc66373 < 74058395b2c63c8a438cf199d09094b640f8c7f4 415f792447572ef1949a3cef5119bbce8cc66373 < ea703cda36da0dacb9a2fd876370003197d8a019 415f792447572ef1949a3cef5119bbce8cc66373 < 333be433ee908a53f283beb95585dfc14c8ffb46
Linux / Linux
4.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/03fa47621bf8fcbf5994c5716021527853f9af3d git.kernel.org: https://git.kernel.org/stable/c/e1c1e8c05010103c9c9ea3e9c4304b0b7e2c8e4a git.kernel.org: https://git.kernel.org/stable/c/006073761888a632c5d6f93e47c41760fa627f77 git.kernel.org: https://git.kernel.org/stable/c/b0642d9c871aea1f28eb02cd84d60434df594f67 git.kernel.org: https://git.kernel.org/stable/c/74058395b2c63c8a438cf199d09094b640f8c7f4 git.kernel.org: https://git.kernel.org/stable/c/ea703cda36da0dacb9a2fd876370003197d8a019 git.kernel.org: https://git.kernel.org/stable/c/333be433ee908a53f283beb95585dfc14c8ffb46 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html