CVE-2025-22082 — Linux vulnerability
11 documents6 sources
Severity
5.5MEDIUMNVD
EPSS
0.1%
top 80.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 16
Latest updateJul 8
Description
In the Linux kernel, the following vulnerability has been resolved:
iio: backend: make sure to NULL terminate stack buffer
Make sure to NULL terminate the buffer in
iio_backend_debugfs_write_reg() before passing it to sscanf(). It is a
stack variable so we should not assume it will 0 initialized.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages5 packages
▶CVEListV5linux/linuxcdf01e0809a4c6c7877ea52401c2a6679df7aed6 — df3892e5e861c43d5612728ed259634675b8a71f+4
Patches
🔴Vulnerability Details
5OSV▶
CVE-2025-22082: In the Linux kernel, the following vulnerability has been resolved: iio: backend: make sure to NULL terminate stack buffer Make sure to NULL terminate↗2025-04-16
GHSA▶
GHSA-m587-7hw6-635x: In the Linux kernel, the following vulnerability has been resolved:
iio: backend: make sure to NULL terminate stack buffer
Make sure to NULL termina↗2025-04-16
📋Vendor Advisories
5Debian▶
CVE-2025-22082: linux - In the Linux kernel, the following vulnerability has been resolved: iio: backen...↗2025