๐Ÿ” CVE Alert

CVE-2025-39719

UNKNOWN 0.0

iio: imu: bno055: fix OOB access of hw_xlate array

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: iio: imu: bno055: fix OOB access of hw_xlate array Fix a potential out-of-bounds array access of the hw_xlate array in bno055.c. In bno055_get_regmask(), hw_xlate was iterated over the length of the vals array instead of the length of the hw_xlate array. In the case of bno055_gyr_scale, the vals array is larger than the hw_xlate array, so this could result in an out-of-bounds access. In practice, this shouldn't happen though because a match should always be found which breaks out of the for loop before it iterates beyond the end of the hw_xlate array. By adding a new hw_xlate_len field to the bno055_sysfs_attr, we can be sure we are iterating over the correct length.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 5, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
4aefe1c2bd0cb0223130671d459cd16efa3d3462 < a0691ab6334f1769acc64ea9e319414a682ff45d 4aefe1c2bd0cb0223130671d459cd16efa3d3462 < 50e823a23816b792daf6e8405f8d6045952bb90e 4aefe1c2bd0cb0223130671d459cd16efa3d3462 < 4808ca3aa30ae857454d0b41d2d0bf161a312b45 4aefe1c2bd0cb0223130671d459cd16efa3d3462 < 5c2b601922c064f7be70ae8621277f18d1ffec59 4aefe1c2bd0cb0223130671d459cd16efa3d3462 < 399b883ec828e436f1a721bf8551b4da8727e65b
Linux / Linux
6.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a0691ab6334f1769acc64ea9e319414a682ff45d git.kernel.org: https://git.kernel.org/stable/c/50e823a23816b792daf6e8405f8d6045952bb90e git.kernel.org: https://git.kernel.org/stable/c/4808ca3aa30ae857454d0b41d2d0bf161a312b45 git.kernel.org: https://git.kernel.org/stable/c/5c2b601922c064f7be70ae8621277f18d1ffec59 git.kernel.org: https://git.kernel.org/stable/c/399b883ec828e436f1a721bf8551b4da8727e65b lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html