CVE-2025-38133
BaseFortify
Publication date: 2025-07-03
Last updated on: 2025-11-20
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves improper pointer handling in the Linux kernel's ADC driver for ad4851/ad4858 devices. Specifically, a pointer to channel data was incremented incorrectly, causing the channels pointer to point past the allocated array. This can lead to memory corruption or undefined behavior because the program may access memory outside the intended bounds.
How can this vulnerability impact me? :
The impact of this vulnerability is potential memory corruption or undefined behavior in the Linux kernel when handling ADC channels for ad4851/ad4858 devices. This could lead to system instability, crashes, or unpredictable behavior in affected systems.