In the Linux kernel, the following vulnerability has been resolved:
iio: dummy: iiosimplydummy_buffer: fix information leak in triggered buffer
The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iioforeachactivechannel() to assign new values.
Use kzalloc for the memory allocation to avoid pushing uninitialized information to userspace.
[
{
"signature_version": "v1",
"id": "CVE-2024-57911-38987686",
"digest": {
"line_hashes": [
"85223661106309619408824491543091518799",
"19015647050866931754071298694001382283",
"252828104709095662692161614970626071367",
"116971205099825723908612896478698984951"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e1c1e8c05010103c9c9ea3e9c4304b0b7e2c8e4a",
"deprecated": false,
"target": {
"file": "drivers/iio/dummy/iio_simple_dummy_buffer.c"
},
"signature_type": "Line"
},
{
"signature_version": "v1",
"id": "CVE-2024-57911-3e528e5e",
"digest": {
"line_hashes": [
"178825901565867454894323403608020449992",
"191469486332282409100679870271431433726",
"252828104709095662692161614970626071367",
"2987130838905432727700041221278128283"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@74058395b2c63c8a438cf199d09094b640f8c7f4",
"deprecated": false,
"target": {
"file": "drivers/iio/dummy/iio_simple_dummy_buffer.c"
},
"signature_type": "Line"
},
{
"signature_version": "v1",
"id": "CVE-2024-57911-64559e41",
"digest": {
"line_hashes": [
"178825901565867454894323403608020449992",
"191469486332282409100679870271431433726",
"252828104709095662692161614970626071367",
"2987130838905432727700041221278128283"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b0642d9c871aea1f28eb02cd84d60434df594f67",
"deprecated": false,
"target": {
"file": "drivers/iio/dummy/iio_simple_dummy_buffer.c"
},
"signature_type": "Line"
},
{
"signature_version": "v1",
"id": "CVE-2024-57911-7641c46f",
"digest": {
"line_hashes": [
"85223661106309619408824491543091518799",
"19015647050866931754071298694001382283",
"252828104709095662692161614970626071367",
"116971205099825723908612896478698984951"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@006073761888a632c5d6f93e47c41760fa627f77",
"deprecated": false,
"target": {
"file": "drivers/iio/dummy/iio_simple_dummy_buffer.c"
},
"signature_type": "Line"
},
{
"signature_version": "v1",
"id": "CVE-2024-57911-8f72701b",
"digest": {
"line_hashes": [
"178825901565867454894323403608020449992",
"191469486332282409100679870271431433726",
"252828104709095662692161614970626071367",
"54753428377517189814245763082796797274"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ea703cda36da0dacb9a2fd876370003197d8a019",
"deprecated": false,
"target": {
"file": "drivers/iio/dummy/iio_simple_dummy_buffer.c"
},
"signature_type": "Line"
},
{
"signature_version": "v1",
"id": "CVE-2024-57911-b752db78",
"digest": {
"line_hashes": [
"178825901565867454894323403608020449992",
"191469486332282409100679870271431433726",
"252828104709095662692161614970626071367",
"54753428377517189814245763082796797274"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@333be433ee908a53f283beb95585dfc14c8ffb46",
"deprecated": false,
"target": {
"file": "drivers/iio/dummy/iio_simple_dummy_buffer.c"
},
"signature_type": "Line"
},
{
"signature_version": "v1",
"id": "CVE-2024-57911-d687d84a",
"digest": {
"line_hashes": [
"85223661106309619408824491543091518799",
"19015647050866931754071298694001382283",
"252828104709095662692161614970626071367",
"116971205099825723908612896478698984951"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@03fa47621bf8fcbf5994c5716021527853f9af3d",
"deprecated": false,
"target": {
"file": "drivers/iio/dummy/iio_simple_dummy_buffer.c"
},
"signature_type": "Line"
}
]