{"id":"CVE-2025-39719","summary":"iio: imu: bno055: fix OOB access of hw_xlate array","details":"In the Linux kernel, the following vulnerability has been resolved:\n\niio: imu: bno055: fix OOB access of hw_xlate array\n\nFix a potential out-of-bounds array access of the hw_xlate array in\nbno055.c.\n\nIn bno055_get_regmask(), hw_xlate was iterated over the length of the\nvals array instead of the length of the hw_xlate array. In the case of\nbno055_gyr_scale, the vals array is larger than the hw_xlate array,\nso this could result in an out-of-bounds access. In practice, this\nshouldn't happen though because a match should always be found which\nbreaks out of the for loop before it iterates beyond the end of the\nhw_xlate array.\n\nBy adding a new hw_xlate_len field to the bno055_sysfs_attr, we can be\nsure we are iterating over the correct length.","modified":"2026-03-20T12:43:01.142601Z","published":"2025-09-05T17:21:26.952Z","related":["MGASA-2025-0234","MGASA-2025-0235","SUSE-SU-2025:03600-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1","openSUSE-SU-2025:20081-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39719.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/399b883ec828e436f1a721bf8551b4da8727e65b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4808ca3aa30ae857454d0b41d2d0bf161a312b45"},{"type":"WEB","url":"https://git.kernel.org/stable/c/50e823a23816b792daf6e8405f8d6045952bb90e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5c2b601922c064f7be70ae8621277f18d1ffec59"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a0691ab6334f1769acc64ea9e319414a682ff45d"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39719.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39719"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4aefe1c2bd0cb0223130671d459cd16efa3d3462"},{"fixed":"a0691ab6334f1769acc64ea9e319414a682ff45d"},{"fixed":"50e823a23816b792daf6e8405f8d6045952bb90e"},{"fixed":"4808ca3aa30ae857454d0b41d2d0bf161a312b45"},{"fixed":"5c2b601922c064f7be70ae8621277f18d1ffec59"},{"fixed":"399b883ec828e436f1a721bf8551b4da8727e65b"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39719.json"}}],"schema_version":"1.7.5"}