-
CVE-2025-39719
- EPSS 0.03%
- Veröffentlicht 05.09.2025 17:21:26
- Zuletzt bearbeitet 08.09.2025 16:25:38
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: iio: imu: bno055: fix OOB access of hw_xlate array Fix a potential out-of-bounds array access of the hw_xlate array in bno055.c. In bno055_get_regmask(), hw_xlate was iterated over the length of the vals array instead of the length of the hw_xlate array. In the case of bno055_gyr_scale, the vals array is larger than the hw_xlate array, so this could result in an out-of-bounds access. In practice, this shouldn't happen though because a match should always be found which breaks out of the for loop before it iterates beyond the end of the hw_xlate array. By adding a new hw_xlate_len field to the bno055_sysfs_attr, we can be sure we are iterating over the correct length.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
a0691ab6334f1769acc64ea9e319414a682ff45d
Version
4aefe1c2bd0cb0223130671d459cd16efa3d3462
Status
affected
Version <
50e823a23816b792daf6e8405f8d6045952bb90e
Version
4aefe1c2bd0cb0223130671d459cd16efa3d3462
Status
affected
Version <
4808ca3aa30ae857454d0b41d2d0bf161a312b45
Version
4aefe1c2bd0cb0223130671d459cd16efa3d3462
Status
affected
Version <
5c2b601922c064f7be70ae8621277f18d1ffec59
Version
4aefe1c2bd0cb0223130671d459cd16efa3d3462
Status
affected
Version <
399b883ec828e436f1a721bf8551b4da8727e65b
Version
4aefe1c2bd0cb0223130671d459cd16efa3d3462
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.1
Status
affected
Version <
6.1
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.149
Status
unaffected
Version <=
6.6.*
Version
6.6.103
Status
unaffected
Version <=
6.12.*
Version
6.12.44
Status
unaffected
Version <=
6.16.*
Version
6.16.4
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.057 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|