CVE-2025-38133
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
03/07/2025
Last modified:
20/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
iio: adc: ad4851: fix ad4858 chan pointer handling<br />
<br />
The pointer returned from ad4851_parse_channels_common() is incremented<br />
internally as each channel is populated. In ad4858_parse_channels(),<br />
the same pointer was further incremented while setting ext_scan_type<br />
fields for each channel. This resulted in indio_dev->channels being set<br />
to a pointer past the end of the allocated array, potentially causing<br />
memory corruption or undefined behavior.<br />
<br />
Fix this by iterating over the channels using an explicit index instead<br />
of incrementing the pointer. This preserves the original base pointer<br />
and ensures all channel metadata is set correctly.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.15 (including) | 6.15.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



