Executive Summary

Informations
Name CVE-2025-22082 First vendor Publication 2025-04-16
Vendor Cve Last vendor Modification 2025-04-17

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

iio: backend: make sure to NULL terminate stack buffer

Make sure to NULL terminate the buffer in iio_backend_debugfs_write_reg() before passing it to sscanf(). It is a stack variable so we should not assume it will 0 initialized.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22082

Sources (Detail)

https://git.kernel.org/stable/c/035b4989211dc1c8626e186d655ae8ca5141bb73
https://git.kernel.org/stable/c/04271a4d2740f98bbe36f82cd3d74677a839d1eb
https://git.kernel.org/stable/c/df3892e5e861c43d5612728ed259634675b8a71f
https://git.kernel.org/stable/c/fd791c81f410ab1c554686a6f486dc7a176dfe35
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-05-27 02:55:24
  • First insertion