VYPR
Unrated severityNVD Advisory· Published Feb 4, 2026· Updated Apr 15, 2026

CVE-2025-71198

CVE-2025-71198

Description

In the Linux kernel, the following vulnerability has been resolved:

iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection

The st_lsm6dsx_acc_channels array of struct iio_chan_spec has a non-NULL event_spec field, indicating support for IIO events. However, event detection is not supported for all sensors, and if userspace tries to configure accelerometer wakeup events on a sensor device that does not support them (e.g. LSM6DS0), st_lsm6dsx_write_event() dereferences a NULL pointer when trying to write to the wakeup register. Define an additional struct iio_chan_spec array whose members have a NULL event_spec field, and use this array instead of st_lsm6dsx_acc_channels for sensors without event detection capability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In Linux kernel's st_lsm6dsx IIO IMU driver, accelerometers without event detection define event channels, causing NULL pointer dereference on wakeup config.

The st_lsm6dsx driver for STM IMU sensors defines an iio_chan_spec array (st_lsm6dsx_acc_channels) with a non-NULL event_spec field, indicating support for IIO events. However, event detection is not available on all sensor variants (e.g., LSM6DS0). When userspace attempts to configure accelerometer wakeup events on such a sensor, st_lsm6dsx_write_event() dereferences a NULL pointer while writing to the wakeup register, leading to a kernel crash.

Exploitation requires local access to the IIO device, typically through sysfs or a custom userspace program. The attacker must be able to enable events on an accelerometer channel of a sensor that lacks event support. No special privileges beyond access to the IIO subsystem are needed, as the misconfiguration originates from the driver's incorrect channel specification.

The impact is a denial of service via NULL pointer dereference, causing a system crash (kernel oops). An attacker could repeatedly trigger this to disrupt system availability. There is no evidence of privilege escalation or data leakage.

The vulnerability is fixed in Linux kernel commits [1] and [2], which introduce a separate iio_chan_spec array with NULL event_spec for sensors without event detection, and use it appropriately. Users should update to a kernel containing these fixes. No workaround is provided.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.