CVE-2025-38133

In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad4851: fix ad4858 chan pointer handling The pointer returned from ad4851_parse_channels_common() is incremented internally as each channel is populated. In ad4858_parse_channels(), the same pointer was further incremented while setting ext_scan_type fields for each channel. This resulted in indio_dev->channels being set to a pointer past the end of the allocated array, potentially causing memory corruption or undefined behavior. Fix this by iterating over the channels using an explicit index instead of incrementing the pointer. This preserves the original base pointer and ensures all channel metadata is set correctly.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

20 Nov 2025, 20:11

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/499a8cee812588905cc940837e69918c1649a19e - () https://git.kernel.org/stable/c/499a8cee812588905cc940837e69918c1649a19e - Patch
References () https://git.kernel.org/stable/c/6c3b9e1167d072ce2d01cafec7866647cf8d3616 - () https://git.kernel.org/stable/c/6c3b9e1167d072ce2d01cafec7866647cf8d3616 - Patch
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

Information

Published : 2025-07-03 09:15

Updated : 2025-11-20 20:11


NVD link : CVE-2025-38133

Mitre link : CVE-2025-38133

CVE.ORG link : CVE-2025-38133


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write