CVE-2025-38485

Source
https://cve.org/CVERecord?id=CVE-2025-38485
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38485.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38485
Downstream
Related
Published
2025-07-28T11:21:49.624Z
Modified
2026-03-20T12:42:53.120115Z
Summary
iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush
Details

In the Linux kernel, the following vulnerability has been resolved:

iio: accel: fxls8962af: Fix use after free in fxls8962affifoflush

fxls8962affifoflush() uses indiodev->activescanmask (with iioforeachactivechannel()) without making sure the indiodev stays in buffer mode. There is a race if indiodev exits buffer mode in the middle of the interrupt that flushes the fifo. Fix this by calling synchronizeirq() to ensure that no interrupt is currently running when disabling buffer mode.

Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read [...] findfirstbitle from fxls8962affifoflush+0x17c/0x290 fxls8962affifoflush from fxls8962afinterrupt+0x80/0x178 fxls8962afinterrupt from irqthreadfn+0x1c/0x7c irqthreadfn from irqthread+0x110/0x1f4 irqthread from kthread+0xe0/0xfc kthread from retfromfork+0x14/0x2c

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38485.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
79e3a5bdd9efbdf4e1069793d7735b432d641e7c
Fixed
6ecd61c201b27ad2760b3975437ad2b97d725b98
Fixed
dda42f23a8f5439eaac9521ce0531547d880cc54
Fixed
bfcda3e1015791b3a63fb4d3aad408da9cf76e8f
Fixed
1803d372460aaa9ae0188a30c9421d3f157f2f04
Fixed
1fe16dc1a2f5057772e5391ec042ed7442966c9a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38485.json"