-
CVE-2025-38485
- EPSS 0.03%
- Published 28.07.2025 11:21:49
- Last modified 29.07.2025 14:14:29
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush fxls8962af_fifo_flush() uses indio_dev->active_scan_mask (with iio_for_each_active_channel()) without making sure the indio_dev stays in buffer mode. There is a race if indio_dev exits buffer mode in the middle of the interrupt that flushes the fifo. Fix this by calling synchronize_irq() to ensure that no interrupt is currently running when disabling buffer mode. Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read [...] _find_first_bit_le from fxls8962af_fifo_flush+0x17c/0x290 fxls8962af_fifo_flush from fxls8962af_interrupt+0x80/0x178 fxls8962af_interrupt from irq_thread_fn+0x1c/0x7c irq_thread_fn from irq_thread+0x110/0x1f4 irq_thread from kthread+0xe0/0xfc kthread from ret_from_fork+0x14/0x2c
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
6ecd61c201b27ad2760b3975437ad2b97d725b98
Version
79e3a5bdd9efbdf4e1069793d7735b432d641e7c
Status
affected
Version <
dda42f23a8f5439eaac9521ce0531547d880cc54
Version
79e3a5bdd9efbdf4e1069793d7735b432d641e7c
Status
affected
Version <
bfcda3e1015791b3a63fb4d3aad408da9cf76e8f
Version
79e3a5bdd9efbdf4e1069793d7735b432d641e7c
Status
affected
Version <
1803d372460aaa9ae0188a30c9421d3f157f2f04
Version
79e3a5bdd9efbdf4e1069793d7735b432d641e7c
Status
affected
Version <
1fe16dc1a2f5057772e5391ec042ed7442966c9a
Version
79e3a5bdd9efbdf4e1069793d7735b432d641e7c
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.14
Status
affected
Version <
5.14
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.147
Status
unaffected
Version <=
6.6.*
Version
6.6.100
Status
unaffected
Version <=
6.12.*
Version
6.12.40
Status
unaffected
Version <=
6.15.*
Version
6.15.8
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.061 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|