CVE-2024-57911

HIGH

Linux Kernel < 5.4.290 - Use of Uninitialized Resource

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.

Scores

CVSS v3 7.1
EPSS 0.0002
EPSS Percentile 3.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-908
Status published
Products (8)
linux/Kernel 4.5.0 - 5.4.290linux
linux/Kernel 5.11.0 - 5.15.177linux
linux/Kernel 5.16.0 - 6.1.125linux
linux/Kernel 5.5.0 - 5.10.234linux
linux/Kernel 6.2.0 - 6.6.72linux
linux/Kernel 6.7.0 - 6.12.10linux
linux/linux_kernel 6.13 rc1 (6 CPE variants)
linux/linux_kernel 4.5 - 5.4.290
Published Jan 19, 2025
Tracked Since Feb 18, 2026