CVE-2024-57911
iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer
CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jan 19, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new high vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
415f792447572ef1949a3cef5119bbce8cc66373 < 03fa47621bf8fcbf5994c5716021527853f9af3d 415f792447572ef1949a3cef5119bbce8cc66373 < e1c1e8c05010103c9c9ea3e9c4304b0b7e2c8e4a 415f792447572ef1949a3cef5119bbce8cc66373 < 006073761888a632c5d6f93e47c41760fa627f77 415f792447572ef1949a3cef5119bbce8cc66373 < b0642d9c871aea1f28eb02cd84d60434df594f67 415f792447572ef1949a3cef5119bbce8cc66373 < 74058395b2c63c8a438cf199d09094b640f8c7f4 415f792447572ef1949a3cef5119bbce8cc66373 < ea703cda36da0dacb9a2fd876370003197d8a019 415f792447572ef1949a3cef5119bbce8cc66373 < 333be433ee908a53f283beb95585dfc14c8ffb46
Linux / Linux
4.5
References
git.kernel.org: https://git.kernel.org/stable/c/03fa47621bf8fcbf5994c5716021527853f9af3d git.kernel.org: https://git.kernel.org/stable/c/e1c1e8c05010103c9c9ea3e9c4304b0b7e2c8e4a git.kernel.org: https://git.kernel.org/stable/c/006073761888a632c5d6f93e47c41760fa627f77 git.kernel.org: https://git.kernel.org/stable/c/b0642d9c871aea1f28eb02cd84d60434df594f67 git.kernel.org: https://git.kernel.org/stable/c/74058395b2c63c8a438cf199d09094b640f8c7f4 git.kernel.org: https://git.kernel.org/stable/c/ea703cda36da0dacb9a2fd876370003197d8a019 git.kernel.org: https://git.kernel.org/stable/c/333be433ee908a53f283beb95585dfc14c8ffb46 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html