CVE-2025-38142
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
03/07/2025
Last modified:
18/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
hwmon: (asus-ec-sensors) check sensor index in read_string()<br />
<br />
Prevent a potential invalid memory access when the requested sensor<br />
is not found.<br />
<br />
find_ec_sensor_index() may return a negative value (e.g. -ENOENT),<br />
but its result was used without checking, which could lead to<br />
undefined behavior when passed to get_sensor_info().<br />
<br />
Add a proper check to return -EINVAL if sensor_index is negative.<br />
<br />
Found by Linux Verification Center (linuxtesting.org) with SVACE.<br />
<br />
[groeck: Return error code returned from find_ec_sensor_index]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.94 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.34 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.3 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/19bd9cde38dd4ca1771aed7afba623e7f4247c8e
- https://git.kernel.org/stable/c/25be318324563c63cbd9cb53186203a08d2f83a1
- https://git.kernel.org/stable/c/4e9e45746b861ebd54c03ef301da2cb8fc990536
- https://git.kernel.org/stable/c/6bf529ce84dccc0074dbc704e70aee4aa545057e
- https://git.kernel.org/stable/c/7eeb3df6f07a886bdfd52757ede127a59a8784dc
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



