-
CVE-2025-71199
- EPSS 0.04%
- Veröffentlicht 04.02.2026 16:07:34
- Zuletzt bearbeitet 06.02.2026 17:16:20
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
iio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver
at91_adc_interrupt can call at91_adc_touch_data_handler function
to start the work by schedule_work(&st->touch_st.workq).
If we remove the module which will call at91_adc_remove to
make cleanup, it will free indio_dev through iio_device_unregister but
quite a bit later. While the work mentioned above will be used. The
sequence of operations that may lead to a UAF bug is as follows:
CPU0 CPU1
| at91_adc_workq_handler
at91_adc_remove |
iio_device_unregister(indio_dev) |
//free indio_dev a bit later |
| iio_push_to_buffers(indio_dev)
| //use indio_dev
Fix it by ensuring that the work is canceled before proceeding with
the cleanup in at91_adc_remove.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
4c83dd62595ee7b7c9298a4d19a256b6647e7240
Version
23ec2774f1cc168b1f32a2e0ed2709cb473bb94e
Status
affected
Version <
fdc8c835c637a3473878d1e7438c77ab8928af63
Version
23ec2774f1cc168b1f32a2e0ed2709cb473bb94e
Status
affected
Version <
919d176b05776c7ede79c36744c823a07d631617
Version
23ec2774f1cc168b1f32a2e0ed2709cb473bb94e
Status
affected
Version <
9795fe80976f8c31cafda7d44edfc0f532d1f7c4
Version
23ec2774f1cc168b1f32a2e0ed2709cb473bb94e
Status
affected
Version <
d7b6fc224c7f5d6d8adcb18037138d3cfe2bbdfe
Version
23ec2774f1cc168b1f32a2e0ed2709cb473bb94e
Status
affected
Version <
d890234a91570542c228a20f132ce74f9fedd904
Version
23ec2774f1cc168b1f32a2e0ed2709cb473bb94e
Status
affected
Version <
dbdb442218cd9d613adeab31a88ac973f22c4873
Version
23ec2774f1cc168b1f32a2e0ed2709cb473bb94e
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.19
Status
affected
Version <
4.19
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.249
Status
unaffected
Version <=
5.15.*
Version
5.15.199
Status
unaffected
Version <=
6.1.*
Version
6.1.162
Status
unaffected
Version <=
6.6.*
Version
6.6.122
Status
unaffected
Version <=
6.12.*
Version
6.12.68
Status
unaffected
Version <=
6.18.*
Version
6.18.8
Status
unaffected
Version <=
*
Version
6.19
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.099 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|