CVE-2023-52627

In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7091r: Allow users to configure device events AD7091R-5 devices are supported by the ad7091r-5 driver together with the ad7091r-base driver. Those drivers declared iio events for notifying user space when ADC readings fall bellow the thresholds of low limit registers or above the values set in high limit registers. However, to configure iio events and their thresholds, a set of callback functions must be implemented and those were not present until now. The consequence of trying to configure ad7091r-5 events without the proper callback functions was a null pointer dereference in the kernel because the pointers to the callback functions were not set. Implement event configuration callbacks allowing users to read/write event thresholds and enable/disable event generation. Since the event spec structs are generic to AD7091R devices, also move those from the ad7091r-5 driver the base driver so they can be reused when support for ad7091r-2/-4/-8 be added.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

29 Apr 2025, 16:34

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://git.kernel.org/stable/c/020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f - () https://git.kernel.org/stable/c/020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f - Patch
References () https://git.kernel.org/stable/c/89c4e63324e208a23098f7fb15c00487cecbfed2 - () https://git.kernel.org/stable/c/89c4e63324e208a23098f7fb15c00487cecbfed2 - Patch
References () https://git.kernel.org/stable/c/55aca2ce91a63740278502066beaddbd841af9c6 - () https://git.kernel.org/stable/c/55aca2ce91a63740278502066beaddbd841af9c6 - Patch
References () https://git.kernel.org/stable/c/49f322ce1f265935f15e5512da69a399f27a5091 - () https://git.kernel.org/stable/c/49f322ce1f265935f15e5512da69a399f27a5091 - Patch
References () https://git.kernel.org/stable/c/1eba6f7ffa295a0eec098c107043074be7cc4ec5 - () https://git.kernel.org/stable/c/1eba6f7ffa295a0eec098c107043074be7cc4ec5 - Patch
References () https://git.kernel.org/stable/c/137568aa540a9f587c48ff7d4c51cdba08cfe9a4 - () https://git.kernel.org/stable/c/137568aa540a9f587c48ff7d4c51cdba08cfe9a4 - Patch
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
First Time Debian debian Linux
Debian
Linux linux Kernel
Linux

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'name': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'tags': [], 'refsource': ''}

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

26 Mar 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-26 18:15

Updated : 2025-04-29 16:34


NVD link : CVE-2023-52627

Mitre link : CVE-2023-52627


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-476

NULL Pointer Dereference