{"id":"CVE-2024-50231","summary":"iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\niio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table()\n\nmodprobe iio-test-gts and rmmod it, then the following memory leak\noccurs:\n\n\tunreferenced object 0xffffff80c810be00 (size 64):\n\t  comm \"kunit_try_catch\", pid 1654, jiffies 4294913981\n\t  hex dump (first 32 bytes):\n\t    02 00 00 00 08 00 00 00 20 00 00 00 40 00 00 00  ........ ...@...\n\t    80 00 00 00 00 02 00 00 00 04 00 00 00 08 00 00  ................\n\t  backtrace (crc a63d875e):\n\t    [\u003c0000000028c1b3c2\u003e] kmemleak_alloc+0x34/0x40\n\t    [\u003c000000001d6ecc87\u003e] __kmalloc_noprof+0x2bc/0x3c0\n\t    [\u003c00000000393795c1\u003e] devm_iio_init_iio_gts+0x4b4/0x16f4\n\t    [\u003c0000000071bb4b09\u003e] 0xffffffdf052a62e0\n\t    [\u003c000000000315bc18\u003e] 0xffffffdf052a6488\n\t    [\u003c00000000f9dc55b5\u003e] kunit_try_run_case+0x13c/0x3ac\n\t    [\u003c00000000175a3fd4\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t    [\u003c00000000f505065d\u003e] kthread+0x2e8/0x374\n\t    [\u003c00000000bbfb0e5d\u003e] ret_from_fork+0x10/0x20\n\tunreferenced object 0xffffff80cbfe9e70 (size 16):\n\t  comm \"kunit_try_catch\", pid 1658, jiffies 4294914015\n\t  hex dump (first 16 bytes):\n\t    10 00 00 00 40 00 00 00 80 00 00 00 00 00 00 00  ....@...........\n\t  backtrace (crc 857f0cb4):\n\t    [\u003c0000000028c1b3c2\u003e] kmemleak_alloc+0x34/0x40\n\t    [\u003c000000001d6ecc87\u003e] __kmalloc_noprof+0x2bc/0x3c0\n\t    [\u003c00000000393795c1\u003e] devm_iio_init_iio_gts+0x4b4/0x16f4\n\t    [\u003c0000000071bb4b09\u003e] 0xffffffdf052a62e0\n\t    [\u003c000000007d089d45\u003e] 0xffffffdf052a6864\n\t    [\u003c00000000f9dc55b5\u003e] kunit_try_run_case+0x13c/0x3ac\n\t    [\u003c00000000175a3fd4\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t    [\u003c00000000f505065d\u003e] kthread+0x2e8/0x374\n\t    [\u003c00000000bbfb0e5d\u003e] ret_from_fork+0x10/0x20\n\t......\n\nIt includes 5*5 times \"size 64\" memory leaks, which correspond to 5 times\ntest_init_iio_gain_scale() calls with gts_test_gains size 10 (10*size(int))\nand gts_test_itimes size 5. It also includes 5*1 times \"size 16\"\nmemory leak, which correspond to one time __test_init_iio_gain_scale()\ncall with gts_test_gains_gain_low size 3 (3*size(int)) and gts_test_itimes\nsize 5.\n\nThe reason is that the per_time_gains[i] is not freed which is allocated in\nthe \"gts-\u003enum_itime\" for loop in iio_gts_build_avail_scale_table().","modified":"2026-04-16T04:32:19.448560554Z","published":"2024-11-09T10:14:41.510Z","related":["SUSE-SU-2024:4314-1","SUSE-SU-2024:4316-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50231.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/16e41593825c3044efca0eb34b2d6ffba306e4ec"},{"type":"WEB","url":"https://git.kernel.org/stable/c/38d6e8be234d87b0eedca50309e25051888b39d1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/691e79ffc42154a9c91dc3b7e96a307037b4be74"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50231.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50231"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"38416c28e16890b52fdd5eb73479299ec3f062f3"},{"fixed":"38d6e8be234d87b0eedca50309e25051888b39d1"},{"fixed":"16e41593825c3044efca0eb34b2d6ffba306e4ec"},{"fixed":"691e79ffc42154a9c91dc3b7e96a307037b4be74"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50231.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}