CVE-2025-38485
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
28/07/2025
Last modified:
07/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush<br />
<br />
fxls8962af_fifo_flush() uses indio_dev->active_scan_mask (with<br />
iio_for_each_active_channel()) without making sure the indio_dev<br />
stays in buffer mode.<br />
There is a race if indio_dev exits buffer mode in the middle of the<br />
interrupt that flushes the fifo. Fix this by calling<br />
synchronize_irq() to ensure that no interrupt is currently running when<br />
disabling buffer mode.<br />
<br />
Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read<br />
[...]<br />
_find_first_bit_le from fxls8962af_fifo_flush+0x17c/0x290<br />
fxls8962af_fifo_flush from fxls8962af_interrupt+0x80/0x178<br />
fxls8962af_interrupt from irq_thread_fn+0x1c/0x7c<br />
irq_thread_fn from irq_thread+0x110/0x1f4<br />
irq_thread from kthread+0xe0/0xfc<br />
kthread from ret_from_fork+0x14/0x2c
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14 (including) | 6.1.147 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.100 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.40 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1803d372460aaa9ae0188a30c9421d3f157f2f04
- https://git.kernel.org/stable/c/1fe16dc1a2f5057772e5391ec042ed7442966c9a
- https://git.kernel.org/stable/c/6ecd61c201b27ad2760b3975437ad2b97d725b98
- https://git.kernel.org/stable/c/bfcda3e1015791b3a63fb4d3aad408da9cf76e8f
- https://git.kernel.org/stable/c/dda42f23a8f5439eaac9521ce0531547d880cc54
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



