In the Linux kernel, the following vulnerability has been resolved: iio: adc: ti-ads1119: fix information leak in triggered buffer The 'scan' local struct is used to push data to user space from a triggered buffer, but it has a hole between the sample (unsigned int) and the timestamp. This hole is never initialized. Initialize the struct to zero before using it to avoid pushing uninitialized information to userspace.
https://git.kernel.org/stable/c/75f339d3ecd38cb1ce05357d647189d4a7f7ed08
https://git.kernel.org/stable/c/2f1687cca911a2f294313c762e0646cd9e7be8cc