{"vulnerability": "CVE-2024-46715", "sightings": [{"uuid": "53cb5632-b7dd-42f6-9a86-6e8085ddc3e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46715", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "a3d51cf8-249f-47ae-a1ba-50932022969c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-46715", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "54383796-8907-4db5-a330-ab19e57880aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46715", "type": "seen", "source": "https://t.me/cvedetector/5915", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46715 - \"Linux IIO Driver Kernel Oops Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-46715 \nPublished : Sept. 18, 2024, 7:15 a.m. | 35\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndriver: iio: add missing checks on iio_info's callback access  \n  \nSome callbacks from iio_info structure are accessed without any check, so  \nif a driver doesn't implement them trying to access the corresponding  \nsysfs entries produce a kernel oops such as:  \n  \n[ 2203.527791] Unable to handle kernel NULL pointer dereference at virtual address 00000000 when execute  \n[...]  \n[ 2203.783416] Call trace:  \n[ 2203.783429]  iio_read_channel_info_avail from dev_attr_show+0x18/0x48  \n[ 2203.789807]  dev_attr_show from sysfs_kf_seq_show+0x90/0x120  \n[ 2203.794181]  sysfs_kf_seq_show from seq_read_iter+0xd0/0x4e4  \n[ 2203.798555]  seq_read_iter from vfs_read+0x238/0x2a0  \n[ 2203.802236]  vfs_read from ksys_read+0xa4/0xd4  \n[ 2203.805385]  ksys_read from ret_fast_syscall+0x0/0x54  \n[ 2203.809135] Exception stack(0xe0badfa8 to 0xe0badff0)  \n[ 2203.812880] dfa0:                   00000003 b6f10f80 00000003 b6eab000 00020000 00000000  \n[ 2203.819746] dfc0: 00000003 b6f10f80 7ff00000 00000003 00000003 00000000 00020000 00000000  \n[ 2203.826619] dfe0: b6e1bc88 bed80958 b6e1bc94 b6e1bcb0  \n[ 2203.830363] Code: bad PC value  \n[ 2203.832695] ---[ end trace 0000000000000000 ]--- \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T10:01:32.000000Z"}]}