In the Linux kernel, the following vulnerability has been resolved:
iio: adc: ad7091r: Allow users to configure device events
AD7091R-5 devices are supported by the ad7091r-5 driver together with
the ad7091r-base driver. Those drivers declared iio events for notifying
user space when ADC readings fall bellow the thresholds of low limit
registers or above the values set in high limit registers.
However, to configure iio events and their thresholds, a set of callback
functions must be implemented and those were not present until now.
The consequence of trying to configure ad7091r-5 events without the
proper callback functions was a null pointer dereference in the kernel
because the pointers to the callback functions were not set.
Implement event configuration callbacks allowing users to read/write
event thresholds and enable/disable event generation.
Since the event spec structs are generic to AD7091R devices, also move
those from the ad7091r-5 driver the base driver so they can be reused
when support for ad7091r-2/-4/-8 be added.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
29 Apr 2025, 16:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f - Patch | |
References | () https://git.kernel.org/stable/c/137568aa540a9f587c48ff7d4c51cdba08cfe9a4 - Patch | |
References | () https://git.kernel.org/stable/c/1eba6f7ffa295a0eec098c107043074be7cc4ec5 - Patch | |
References | () https://git.kernel.org/stable/c/49f322ce1f265935f15e5512da69a399f27a5091 - Patch | |
References | () https://git.kernel.org/stable/c/55aca2ce91a63740278502066beaddbd841af9c6 - Patch | |
References | () https://git.kernel.org/stable/c/89c4e63324e208a23098f7fb15c00487cecbfed2 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
First Time |
Debian
Linux linux Kernel Debian debian Linux Linux |
|
CWE | CWE-476 | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
21 Nov 2024, 08:40
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f - | |
References | () https://git.kernel.org/stable/c/137568aa540a9f587c48ff7d4c51cdba08cfe9a4 - | |
References | () https://git.kernel.org/stable/c/1eba6f7ffa295a0eec098c107043074be7cc4ec5 - | |
References | () https://git.kernel.org/stable/c/49f322ce1f265935f15e5512da69a399f27a5091 - | |
References | () https://git.kernel.org/stable/c/55aca2ce91a63740278502066beaddbd841af9c6 - | |
References | () https://git.kernel.org/stable/c/89c4e63324e208a23098f7fb15c00487cecbfed2 - |
04 Nov 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
04 Nov 2024, 13:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Mar 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-26 18:15
Updated : 2025-04-29 16:34
NVD link : CVE-2023-52627
Mitre link : CVE-2023-52627
CVE.ORG link : CVE-2023-52627
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference