VYPR
High severity7.1NVD Advisory· Published Sep 5, 2025· Updated May 12, 2026

CVE-2025-39687

CVE-2025-39687

Description

In the Linux kernel, the following vulnerability has been resolved:

iio: light: as73211: Ensure buffer holes are zeroed

Given that the buffer is copied to a kfifo that ultimately user space can read, ensure we zero it.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's AS73211 light sensor driver, uninitialized buffer holes can leak kernel memory to user space via IIO kfifo.

Vulnerability

The Linux kernel's IIO (Industrial I/O) subsystem driver for the AMS AS73211 light sensor (drivers/iio/light/as73211.c) contains a memory initialization flaw. When preparing data for the IIO buffer that is subsequently copied into a kfifo accessible to user space, the driver fails to zero the entire buffer structure. This leaves "holes" — uninitialized padding or reserved fields — containing stale kernel memory values [1].

Exploitation

An attacker does not need special privileges to trigger the leak; any process with access to the IIO device (e.g., via sysfs or devfs entries) can read from the buffer. The vulnerability is exposed when user space reads the captured sensor data through the IIO character device or via sysfs trigger buffers. No authentication is required beyond standard file-system permissions for the IIO device node [1].

Impact

A local user can read uninitialized kernel heap memory, potentially disclosing sensitive information such as cryptographic keys, passwords, or other kernel data. The CVE is rated High (CVSS 7.1), reflecting the confidentiality impact from the information leak [1].

Mitigation

The fix was committed to the Linux kernel stable branches. The patch ensures the buffer pointer is zeroed before each capture, eliminating any uninitialized gaps. Users should apply the latest stable kernel updates containing commit identifiers from the referenced content. The vulnerability affects all versions prior to the fix [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

6
  • cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
  • Linux/Kernel3 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=5.10,<5.10.241
    • cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
  • Linux/as73211llm-create
  • Linux/Linuxv5
    Range: 5.10

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

1