CVE-2025-68330

Source
https://cve.org/CVERecord?id=CVE-2025-68330
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68330.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68330
Downstream
Related
Published
2025-12-22T16:12:23.864Z
Modified
2026-03-31T17:30:00.451878610Z
Summary
iio: accel: bmc150: Fix irq assumption regression
Details

In the Linux kernel, the following vulnerability has been resolved:

iio: accel: bmc150: Fix irq assumption regression

The code in bmc150-accel-core.c unconditionally calls bmc150accelsetinterrupt() in the iiobuffersetupops, such as on the runtime PM resume path giving a kernel splat like this if the device has no interrupts:

Unable to handle kernel NULL pointer dereference at virtual address 00000001 when read

PC is at bmc150accelset_interrupt+0x98/0x194 LR is at __pmruntimeresume+0x5c/0x64 (...) Call trace: bmc150accelsetinterrupt from bmc150accelbufferpostenable+0x40/0x108 bmc150accelbuffer_postenable from __iioupdatebuffers+0xbe0/0xcbc _iioupdatebuffers from enablestore+0x84/0xc8 enablestore from kernfsfopwriteiter+0x154/0x1b4

This bug seems to have been in the driver since the beginning, but it only manifests recently, I do not know why.

Store the IRQ number in the state struct, as this is a common pattern in other drivers, then use this to determine if we have IRQ support or not.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68330.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c16bff4844ffa678ba0c9d077e9797506924ccdd
Fixed
aad9d048a3211c48ec02efa405bf462856feb862
Fixed
c891f504bb66604c822e7985e093cf39b97fdeb0
Fixed
cdd4a9e98004bd7c7488311951fa6dbae38b2b80
Fixed
65ad4ed983fd9ee0259d86391d6a53f78203918c
Fixed
93eaa5ddc5fc4f50ac396afad8ce261102ebd4f3
Fixed
3aa385a9c75c09b59dcab2ff76423439d23673ab

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68330.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.2.0
Fixed
5.15.197
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.159
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.119
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.61
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.11

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68330.json"