๐Ÿ” CVE Alert

CVE-2025-22082

UNKNOWN 0.0

iio: backend: make sure to NULL terminate stack buffer

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: iio: backend: make sure to NULL terminate stack buffer Make sure to NULL terminate the buffer in iio_backend_debugfs_write_reg() before passing it to sscanf(). It is a stack variable so we should not assume it will 0 initialized.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
cdf01e0809a4c6c7877ea52401c2a6679df7aed6 < df3892e5e861c43d5612728ed259634675b8a71f cdf01e0809a4c6c7877ea52401c2a6679df7aed6 < 04271a4d2740f98bbe36f82cd3d74677a839d1eb cdf01e0809a4c6c7877ea52401c2a6679df7aed6 < fd791c81f410ab1c554686a6f486dc7a176dfe35 cdf01e0809a4c6c7877ea52401c2a6679df7aed6 < 035b4989211dc1c8626e186d655ae8ca5141bb73
Linux / Linux
6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/df3892e5e861c43d5612728ed259634675b8a71f git.kernel.org: https://git.kernel.org/stable/c/04271a4d2740f98bbe36f82cd3d74677a839d1eb git.kernel.org: https://git.kernel.org/stable/c/fd791c81f410ab1c554686a6f486dc7a176dfe35 git.kernel.org: https://git.kernel.org/stable/c/035b4989211dc1c8626e186d655ae8ca5141bb73