Home

Description

In the Linux kernel, the following vulnerability has been resolved: iio: fix potential out-of-bound write The buffer is set to 20 characters. If a caller write more characters, count is truncated to the max available space in "simple_write_to_buffer". To protect from OoB access, check that the input size fit into buffer and add a zero terminator after copy to the end of the copied data.

PUBLISHED Reserved 2025-04-16 | Published 2025-08-22 | Updated 2025-08-22 | Assigner Linux

Product status

Default status
unaffected

6d5dd486c715908b5a6ed02315a15ff044a91025 before 81a635b6eccd6fc889f6d07ab9583b705f739ce1
affected

6d5dd486c715908b5a6ed02315a15ff044a91025 before 16285a0931869baa618b1f5d304e1e9d090470a8
affected

Default status
affected

6.15
affected

Any version before 6.15
unaffected

6.15.9
unaffected

6.16
unaffected

References

git.kernel.org/...c/81a635b6eccd6fc889f6d07ab9583b705f739ce1

git.kernel.org/...c/16285a0931869baa618b1f5d304e1e9d090470a8

cve.org (CVE-2025-38667)

nvd.nist.gov (CVE-2025-38667)

Download JSON