CVE-2025-38485

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38485
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38485.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38485
Downstream
Related
Published
2025-07-28T12:15:30Z
Modified
2025-08-30T18:01:37Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

iio: accel: fxls8962af: Fix use after free in fxls8962affifoflush

fxls8962affifoflush() uses indiodev->activescanmask (with iioforeachactivechannel()) without making sure the indiodev stays in buffer mode. There is a race if indiodev exits buffer mode in the middle of the interrupt that flushes the fifo. Fix this by calling synchronizeirq() to ensure that no interrupt is currently running when disabling buffer mode.

Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read [...] findfirstbitle from fxls8962affifoflush+0x17c/0x290 fxls8962affifoflush from fxls8962afinterrupt+0x80/0x178 fxls8962afinterrupt from irqthreadfn+0x1c/0x7c irqthreadfn from irqthread+0x110/0x1f4 irqthread from kthread+0xe0/0xfc kthread from retfromfork+0x14/0x2c

References

Affected packages