{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-38694","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:24.032Z","datePublished":"2025-09-04T15:32:47.449Z","dateUpdated":"2026-05-12T12:05:30.790Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:33:10.917Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()\n\nIn dib7090p_rw_on_apb, msg is controlled by user. When msg[0].buf is null and\nmsg[0].len is zero, former checks on msg[0].buf would be passed. If accessing\nmsg[0].buf[2] without sanity check, null pointer deref would happen. We add\ncheck on msg[0].len to prevent crash. Similar issue occurs when access\nmsg[1].buf[0] and msg[1].buf[1].\n\nSimilar commit: commit 0ed554fd769a (\"media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()\")"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/dvb-frontends/dib7000p.c"],"versions":[{"version":"713d54a8bd812229410a1902cd9b332a2a27af9f","lessThan":"bc07cae4f36bb18d5b6a9ed835c1278ca44ec82e","status":"affected","versionType":"git"},{"version":"713d54a8bd812229410a1902cd9b332a2a27af9f","lessThan":"ce8b7c711b9c4f040b5419729d0972db8e374324","status":"affected","versionType":"git"},{"version":"713d54a8bd812229410a1902cd9b332a2a27af9f","lessThan":"529fd5593b721e6f4370c591f5086649ed149ff6","status":"affected","versionType":"git"},{"version":"713d54a8bd812229410a1902cd9b332a2a27af9f","lessThan":"c33280d6bd668dbdc5a5f07887cc63a52ab4789c","status":"affected","versionType":"git"},{"version":"713d54a8bd812229410a1902cd9b332a2a27af9f","lessThan":"09906650484a09b3a4d4b3d3065395856810becd","status":"affected","versionType":"git"},{"version":"713d54a8bd812229410a1902cd9b332a2a27af9f","lessThan":"0bb32863426afe0badac25c28d59021f211d0f48","status":"affected","versionType":"git"},{"version":"713d54a8bd812229410a1902cd9b332a2a27af9f","lessThan":"a0f744d6cdde81d7382e183f77a4080a39b206cd","status":"affected","versionType":"git"},{"version":"713d54a8bd812229410a1902cd9b332a2a27af9f","lessThan":"19eb5d8e6aa1169d368a4d69aae5572950deb89d","status":"affected","versionType":"git"},{"version":"713d54a8bd812229410a1902cd9b332a2a27af9f","lessThan":"ce5cac69b2edac3e3246fee03e8f4c2a1075238b","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/dvb-frontends/dib7000p.c"],"versions":[{"version":"2.6.39","status":"affected"},{"version":"0","lessThan":"2.6.39","status":"unaffected","versionType":"semver"},{"version":"5.4.297","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.241","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.190","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.149","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.103","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.43","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.15.11","lessThanOrEqual":"6.15.*","status":"unaffected","versionType":"semver"},{"version":"6.16.2","lessThanOrEqual":"6.16.*","status":"unaffected","versionType":"semver"},{"version":"6.17","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.39","versionEndExcluding":"5.4.297"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.39","versionEndExcluding":"5.10.241"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.39","versionEndExcluding":"5.15.190"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.39","versionEndExcluding":"6.1.149"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.39","versionEndExcluding":"6.6.103"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.39","versionEndExcluding":"6.12.43"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.39","versionEndExcluding":"6.15.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.39","versionEndExcluding":"6.16.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.39","versionEndExcluding":"6.17"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/bc07cae4f36bb18d5b6a9ed835c1278ca44ec82e"},{"url":"https://git.kernel.org/stable/c/ce8b7c711b9c4f040b5419729d0972db8e374324"},{"url":"https://git.kernel.org/stable/c/529fd5593b721e6f4370c591f5086649ed149ff6"},{"url":"https://git.kernel.org/stable/c/c33280d6bd668dbdc5a5f07887cc63a52ab4789c"},{"url":"https://git.kernel.org/stable/c/09906650484a09b3a4d4b3d3065395856810becd"},{"url":"https://git.kernel.org/stable/c/0bb32863426afe0badac25c28d59021f211d0f48"},{"url":"https://git.kernel.org/stable/c/a0f744d6cdde81d7382e183f77a4080a39b206cd"},{"url":"https://git.kernel.org/stable/c/19eb5d8e6aa1169d368a4d69aae5572950deb89d"},{"url":"https://git.kernel.org/stable/c/ce5cac69b2edac3e3246fee03e8f4c2a1075238b"}],"title":"media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T17:41:20.959Z"}},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T12:05:30.790Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC CN 4100","versions":[{"status":"affected","version":"0","lessThan":"V5.0","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-032379.html"}]}]}}