We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-22082

iio: backend: make sure to NULL terminate stack buffer



Description

In the Linux kernel, the following vulnerability has been resolved: iio: backend: make sure to NULL terminate stack buffer Make sure to NULL terminate the buffer in iio_backend_debugfs_write_reg() before passing it to sscanf(). It is a stack variable so we should not assume it will 0 initialized.

Reserved 2024-12-29 | Published 2025-04-16 | Updated 2025-05-26 | Assigner Linux

Product status

Default status
unaffected

cdf01e0809a4c6c7877ea52401c2a6679df7aed6 before df3892e5e861c43d5612728ed259634675b8a71f
affected

cdf01e0809a4c6c7877ea52401c2a6679df7aed6 before 04271a4d2740f98bbe36f82cd3d74677a839d1eb
affected

cdf01e0809a4c6c7877ea52401c2a6679df7aed6 before fd791c81f410ab1c554686a6f486dc7a176dfe35
affected

cdf01e0809a4c6c7877ea52401c2a6679df7aed6 before 035b4989211dc1c8626e186d655ae8ca5141bb73
affected

Default status
affected

6.12
affected

Any version before 6.12
unaffected

6.12.23
unaffected

6.13.11
unaffected

6.14.2
unaffected

6.15
unaffected

References

git.kernel.org/...c/df3892e5e861c43d5612728ed259634675b8a71f

git.kernel.org/...c/04271a4d2740f98bbe36f82cd3d74677a839d1eb

git.kernel.org/...c/fd791c81f410ab1c554686a6f486dc7a176dfe35

git.kernel.org/...c/035b4989211dc1c8626e186d655ae8ca5141bb73

cve.org (CVE-2025-22082)

nvd.nist.gov (CVE-2025-22082)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-22082

Support options

Helpdesk Chat, Email, Knowledgebase