CVE-2025-40221
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-12-04

Last updated on: 2025-12-04

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: media: pci: mg4b: fix uninitialized iio scan data Fix potential leak of uninitialized stack data to userspace by ensuring that the `scan` structure is zeroed before use.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-04
Last Modified
2025-12-04
Generated
2026-05-07
AI Q&A
2025-12-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel's media pci mg4b driver involves a potential leak of uninitialized stack data to userspace. The issue occurs because the 'scan' structure was not zeroed before use, which could allow sensitive or unintended data from the stack to be exposed. The fix ensures that the 'scan' structure is properly zeroed to prevent this data leak.


How can this vulnerability impact me? :

The vulnerability could lead to unintended disclosure of sensitive or residual data from the kernel stack to userspace applications. This might allow an attacker or unprivileged user to access information they should not have, potentially leading to information leakage or aiding further attacks.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update your Linux kernel to the version that includes the fix for the uninitialized iio scan data in the mg4b PCI driver. This ensures that the scan structure is properly zeroed before use, preventing potential leakage of uninitialized stack data to userspace.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart