Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-73452.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-73452
Upstream
Published
2025-07-28T12:15:30Z
Modified
2026-04-01T05:22:38.100788Z
Summary
CVE-2025-38485 affecting package kernel 5.15.200.1-1
Details

In the Linux kernel, the following vulnerability has been resolved:

iio: accel: fxls8962af: Fix use after free in fxls8962affifoflush

fxls8962affifoflush() uses indiodev->activescanmask (with iioforeachactivechannel()) without making sure the indiodev stays in buffer mode. There is a race if indiodev exits buffer mode in the middle of the interrupt that flushes the fifo. Fix this by calling synchronizeirq() to ensure that no interrupt is currently running when disabling buffer mode.

Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read [...] findfirstbitle from fxls8962affifoflush+0x17c/0x290 fxls8962affifoflush from fxls8962afinterrupt+0x80/0x178 fxls8962afinterrupt from irqthreadfn+0x1c/0x7c irqthreadfn from irqthread+0x110/0x1f4 irqthread from kthread+0xe0/0xfc kthread from retfromfork+0x14/0x2c

References

Affected packages

Azure Linux:2 / kernel

Package

Name
kernel
Purl
pkg:rpm/azure-linux/kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
5.15.200.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-73452.json"