Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-38133 (GCVE-0-2025-38133)
Vulnerability from cvelistv5
Published
2025-07-03 08:35
Modified
2025-07-28 04:13
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
iio: adc: ad4851: fix ad4858 chan pointer handling
The pointer returned from ad4851_parse_channels_common() is incremented
internally as each channel is populated. In ad4858_parse_channels(),
the same pointer was further incremented while setting ext_scan_type
fields for each channel. This resulted in indio_dev->channels being set
to a pointer past the end of the allocated array, potentially causing
memory corruption or undefined behavior.
Fix this by iterating over the channels using an explicit index instead
of incrementing the pointer. This preserves the original base pointer
and ensures all channel metadata is set correctly.
References
Impacted products
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/iio/adc/ad4851.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "6c3b9e1167d072ce2d01cafec7866647cf8d3616", "status": "affected", "version": "6250803fe2ec92be32a4df1c3a39c4a460d5bd58", "versionType": "git" }, { "lessThan": "499a8cee812588905cc940837e69918c1649a19e", "status": "affected", "version": "6250803fe2ec92be32a4df1c3a39c4a460d5bd58", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/iio/adc/ad4851.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.15" }, { "lessThan": "6.15", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.15.*", "status": "unaffected", "version": "6.15.3", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.16", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.15.3", "versionStartIncluding": "6.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.16", "versionStartIncluding": "6.15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ad4851: fix ad4858 chan pointer handling\n\nThe pointer returned from ad4851_parse_channels_common() is incremented\ninternally as each channel is populated. In ad4858_parse_channels(),\nthe same pointer was further incremented while setting ext_scan_type\nfields for each channel. This resulted in indio_dev-\u003echannels being set\nto a pointer past the end of the allocated array, potentially causing\nmemory corruption or undefined behavior.\n\nFix this by iterating over the channels using an explicit index instead\nof incrementing the pointer. This preserves the original base pointer\nand ensures all channel metadata is set correctly." } ], "providerMetadata": { "dateUpdated": "2025-07-28T04:13:08.930Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/6c3b9e1167d072ce2d01cafec7866647cf8d3616" }, { "url": "https://git.kernel.org/stable/c/499a8cee812588905cc940837e69918c1649a19e" } ], "title": "iio: adc: ad4851: fix ad4858 chan pointer handling", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2025-38133", "datePublished": "2025-07-03T08:35:36.802Z", "dateReserved": "2025-04-16T04:51:23.987Z", "dateUpdated": "2025-07-28T04:13:08.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-38133\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-07-03T09:15:27.697\",\"lastModified\":\"2025-07-03T15:13:53.147\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\niio: adc: ad4851: fix ad4858 chan pointer handling\\n\\nThe pointer returned from ad4851_parse_channels_common() is incremented\\ninternally as each channel is populated. In ad4858_parse_channels(),\\nthe same pointer was further incremented while setting ext_scan_type\\nfields for each channel. This resulted in indio_dev-\u003echannels being set\\nto a pointer past the end of the allocated array, potentially causing\\nmemory corruption or undefined behavior.\\n\\nFix this by iterating over the channels using an explicit index instead\\nof incrementing the pointer. This preserves the original base pointer\\nand ensures all channel metadata is set correctly.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/499a8cee812588905cc940837e69918c1649a19e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6c3b9e1167d072ce2d01cafec7866647cf8d3616\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
wid-sec-w-2025-1452
Vulnerability from csaf_certbund
Published
2025-07-02 22:00
Modified
2025-09-02 22:00
Summary
Linux Kernel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen und andere, nicht spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und andere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1452 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1452.json" }, { "category": "self", "summary": "WID-SEC-2025-1452 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1452" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38091", "url": "https://lore.kernel.org/linux-cve-announce/2025070235-CVE-2025-38091-cb97@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38092", "url": "https://lore.kernel.org/linux-cve-announce/2025070237-CVE-2025-38092-70a8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38093", "url": "https://lore.kernel.org/linux-cve-announce/2025070237-CVE-2025-38093-a615@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38094", "url": "https://lore.kernel.org/linux-cve-announce/2025070324-CVE-2025-38094-1b5c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38095", "url": "https://lore.kernel.org/linux-cve-announce/2025070340-CVE-2025-38095-6596@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38096", "url": "https://lore.kernel.org/linux-cve-announce/2025070303-CVE-2025-38096-ae58@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38097", "url": "https://lore.kernel.org/linux-cve-announce/2025070305-CVE-2025-38097-287c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38098", "url": "https://lore.kernel.org/linux-cve-announce/2025070305-CVE-2025-38098-2802@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38099", "url": "https://lore.kernel.org/linux-cve-announce/2025070306-CVE-2025-38099-dffb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38100", "url": "https://lore.kernel.org/linux-cve-announce/2025070319-CVE-2025-38100-5040@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38101", "url": "https://lore.kernel.org/linux-cve-announce/2025070321-CVE-2025-38101-56c1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38102", "url": "https://lore.kernel.org/linux-cve-announce/2025070321-CVE-2025-38102-d592@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38103", "url": "https://lore.kernel.org/linux-cve-announce/2025070322-CVE-2025-38103-dd1b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38105", "url": "https://lore.kernel.org/linux-cve-announce/2025070322-CVE-2025-38105-dfcf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38106", "url": "https://lore.kernel.org/linux-cve-announce/2025070322-CVE-2025-38106-8de3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38107", "url": "https://lore.kernel.org/linux-cve-announce/2025070323-CVE-2025-38107-9344@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38108", "url": "https://lore.kernel.org/linux-cve-announce/2025070323-CVE-2025-38108-9c8c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38109", "url": "https://lore.kernel.org/linux-cve-announce/2025070323-CVE-2025-38109-f925@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38110", "url": "https://lore.kernel.org/linux-cve-announce/2025070324-CVE-2025-38110-a9c0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38111", "url": "https://lore.kernel.org/linux-cve-announce/2025070324-CVE-2025-38111-8e9a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38112", "url": "https://lore.kernel.org/linux-cve-announce/2025070324-CVE-2025-38112-57a2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38113", "url": "https://lore.kernel.org/linux-cve-announce/2025070325-CVE-2025-38113-d080@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38114", "url": "https://lore.kernel.org/linux-cve-announce/2025070325-CVE-2025-38114-c603@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38115", "url": "https://lore.kernel.org/linux-cve-announce/2025070325-CVE-2025-38115-cce2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38116", "url": "https://lore.kernel.org/linux-cve-announce/2025070325-CVE-2025-38116-1d80@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38117", "url": "https://lore.kernel.org/linux-cve-announce/2025070326-CVE-2025-38117-3424@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38118", "url": "https://lore.kernel.org/linux-cve-announce/2025070326-CVE-2025-38118-f9ca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38119", "url": "https://lore.kernel.org/linux-cve-announce/2025070326-CVE-2025-38119-9bbe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38120", "url": "https://lore.kernel.org/linux-cve-announce/2025070327-CVE-2025-38120-4498@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38121", "url": "https://lore.kernel.org/linux-cve-announce/2025070327-CVE-2025-38121-5390@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38122", "url": "https://lore.kernel.org/linux-cve-announce/2025070327-CVE-2025-38122-cd8d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38123", "url": "https://lore.kernel.org/linux-cve-announce/2025070328-CVE-2025-38123-3e20@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38124", "url": "https://lore.kernel.org/linux-cve-announce/2025070328-CVE-2025-38124-bc19@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38125", "url": "https://lore.kernel.org/linux-cve-announce/2025070328-CVE-2025-38125-8a6b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38126", "url": "https://lore.kernel.org/linux-cve-announce/2025070329-CVE-2025-38126-3c9b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38127", "url": "https://lore.kernel.org/linux-cve-announce/2025070329-CVE-2025-38127-686d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38128", "url": "https://lore.kernel.org/linux-cve-announce/2025070329-CVE-2025-38128-5b44@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38129", "url": "https://lore.kernel.org/linux-cve-announce/2025070330-CVE-2025-38129-3c0e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38130", "url": "https://lore.kernel.org/linux-cve-announce/2025070330-CVE-2025-38130-3371@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38131", "url": "https://lore.kernel.org/linux-cve-announce/2025070330-CVE-2025-38131-2350@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38132", "url": "https://lore.kernel.org/linux-cve-announce/2025070331-CVE-2025-38132-bfc9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38133", "url": "https://lore.kernel.org/linux-cve-announce/2025070331-CVE-2025-38133-5976@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38134", "url": "https://lore.kernel.org/linux-cve-announce/2025070331-CVE-2025-38134-cbff@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38135", "url": "https://lore.kernel.org/linux-cve-announce/2025070331-CVE-2025-38135-20aa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38136", "url": "https://lore.kernel.org/linux-cve-announce/2025070332-CVE-2025-38136-1489@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38137", "url": "https://lore.kernel.org/linux-cve-announce/2025070332-CVE-2025-38137-d4bf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38138", "url": "https://lore.kernel.org/linux-cve-announce/2025070332-CVE-2025-38138-e28b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38139", "url": "https://lore.kernel.org/linux-cve-announce/2025070333-CVE-2025-38139-5152@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38140", "url": "https://lore.kernel.org/linux-cve-announce/2025070333-CVE-2025-38140-0ba9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38141", "url": "https://lore.kernel.org/linux-cve-announce/2025070333-CVE-2025-38141-560e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38142", "url": "https://lore.kernel.org/linux-cve-announce/2025070334-CVE-2025-38142-a038@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38143", "url": "https://lore.kernel.org/linux-cve-announce/2025070334-CVE-2025-38143-09c4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38144", "url": "https://lore.kernel.org/linux-cve-announce/2025070334-CVE-2025-38144-036b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38145", "url": "https://lore.kernel.org/linux-cve-announce/2025070335-CVE-2025-38145-548b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38146", "url": "https://lore.kernel.org/linux-cve-announce/2025070335-CVE-2025-38146-4390@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38147", "url": "https://lore.kernel.org/linux-cve-announce/2025070335-CVE-2025-38147-52a6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38148", "url": "https://lore.kernel.org/linux-cve-announce/2025070336-CVE-2025-38148-76a4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38149", "url": "https://lore.kernel.org/linux-cve-announce/2025070336-CVE-2025-38149-0dad@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38150", "url": "https://lore.kernel.org/linux-cve-announce/2025070336-CVE-2025-38150-3ce8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38151", "url": "https://lore.kernel.org/linux-cve-announce/2025070336-CVE-2025-38151-6483@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38153", "url": "https://lore.kernel.org/linux-cve-announce/2025070337-CVE-2025-38153-5735@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38154", "url": "https://lore.kernel.org/linux-cve-announce/2025070337-CVE-2025-38154-8353@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38155", "url": "https://lore.kernel.org/linux-cve-announce/2025070337-CVE-2025-38155-9967@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38156", "url": "https://lore.kernel.org/linux-cve-announce/2025070338-CVE-2025-38156-d23e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38157", "url": "https://lore.kernel.org/linux-cve-announce/2025070338-CVE-2025-38157-bc8c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38158", "url": "https://lore.kernel.org/linux-cve-announce/2025070338-CVE-2025-38158-d5f0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38159", "url": "https://lore.kernel.org/linux-cve-announce/2025070339-CVE-2025-38159-0c95@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38160", "url": "https://lore.kernel.org/linux-cve-announce/2025070339-CVE-2025-38160-04ed@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38161", "url": "https://lore.kernel.org/linux-cve-announce/2025070339-CVE-2025-38161-0949@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38162", "url": "https://lore.kernel.org/linux-cve-announce/2025070340-CVE-2025-38162-cd74@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38163", "url": "https://lore.kernel.org/linux-cve-announce/2025070340-CVE-2025-38163-273b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38164", "url": "https://lore.kernel.org/linux-cve-announce/2025070340-CVE-2025-38164-2a23@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38165", "url": "https://lore.kernel.org/linux-cve-announce/2025070341-CVE-2025-38165-0d70@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38166", "url": "https://lore.kernel.org/linux-cve-announce/2025070341-CVE-2025-38166-3dc8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38167", "url": "https://lore.kernel.org/linux-cve-announce/2025070341-CVE-2025-38167-535f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38168", "url": "https://lore.kernel.org/linux-cve-announce/2025070341-CVE-2025-38168-da4f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38169", "url": "https://lore.kernel.org/linux-cve-announce/2025070342-CVE-2025-38169-11b6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38170", "url": "https://lore.kernel.org/linux-cve-announce/2025070342-CVE-2025-38170-0f47@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38171", "url": "https://lore.kernel.org/linux-cve-announce/2025070342-CVE-2025-38171-a380@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38172", "url": "https://lore.kernel.org/linux-cve-announce/2025070343-CVE-2025-38172-13be@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38173", "url": "https://lore.kernel.org/linux-cve-announce/2025070343-CVE-2025-38173-f02e@gregkh/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11245 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:11245" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7655-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7654-4" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11861 vom 2025-07-28", "url": "https://access.redhat.com/errata/RHSA-2025:11861" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11855 vom 2025-07-28", "url": "https://access.redhat.com/errata/RHSA-2025:11855" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7654-5" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11861 vom 2025-07-30", "url": "https://linux.oracle.com/errata/ELSA-2025-11861.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11855 vom 2025-07-30", "url": "https://linux.oracle.com/errata/ELSA-2025-11855.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-098 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-098.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-105 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-105.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7686-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-106 vom 2025-08-09", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-106.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13589 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13589" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13590 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13590" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13598 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13598" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-13589 vom 2025-08-12", "url": "https://linux.oracle.com/errata/ELSA-2025-13589.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5973 vom 2025-08-12", "url": "https://lists.debian.org/debian-security-announce/2025/msg00137.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4271 vom 2025-08-13", "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-13598 vom 2025-08-15", "url": "https://linux.oracle.com/errata/ELSA-2025-13598.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13962 vom 2025-08-18", "url": "https://access.redhat.com/errata/RHSA-2025:13962" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02848-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022193.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02851-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022202.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02852-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022201.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02850-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022203.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02849-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022204.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14009 vom 2025-08-18", "url": "https://access.redhat.com/errata/RHSA-2025:14009" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7699-1 vom 2025-08-18", "url": "https://ubuntu.com/security/notices/USN-7699-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-2968 vom 2025-08-19", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2968.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-13962 vom 2025-08-20", "url": "https://linux.oracle.com/errata/ELSA-2025-13962.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7699-2 vom 2025-08-20", "url": "https://ubuntu.com/security/notices/USN-7699-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-14009 vom 2025-08-22", "url": "https://linux.oracle.com/errata/ELSA-2025-14009.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7711-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7712-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7721-1 vom 2025-08-28", "url": "https://ubuntu.com/security/notices/USN-7721-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7712-2" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-02T22:00:00.000+00:00", "generator": { "date": "2025-09-03T07:16:41.977+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1452", "initial_release_date": "2025-07-02T22:00:00.000+00:00", "revision_history": [ { "date": "2025-07-02T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-27T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-10T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-11T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-08-17T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2025-08-18T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE, Red Hat und Ubuntu aufgenommen" }, { "date": "2025-08-19T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-20T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-21T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-24T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-27T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-28T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-08-31T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "22" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T045032", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-38091", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38091" }, { "cve": "CVE-2025-38092", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38092" }, { "cve": "CVE-2025-38093", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38093" }, { "cve": "CVE-2025-38094", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38094" }, { "cve": "CVE-2025-38095", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38095" }, { "cve": "CVE-2025-38096", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38096" }, { "cve": "CVE-2025-38097", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38097" }, { "cve": "CVE-2025-38098", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38098" }, { "cve": "CVE-2025-38099", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38099" }, { "cve": "CVE-2025-38100", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38100" }, { "cve": "CVE-2025-38101", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38101" }, { "cve": "CVE-2025-38102", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38102" }, { "cve": "CVE-2025-38103", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38103" }, { "cve": "CVE-2025-38105", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38105" }, { "cve": "CVE-2025-38106", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38106" }, { "cve": "CVE-2025-38107", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38107" }, { "cve": "CVE-2025-38108", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38108" }, { "cve": "CVE-2025-38109", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38109" }, { "cve": "CVE-2025-38110", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38110" }, { "cve": "CVE-2025-38111", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38111" }, { "cve": "CVE-2025-38112", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38112" }, { "cve": "CVE-2025-38113", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38113" }, { "cve": "CVE-2025-38114", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38114" }, { "cve": "CVE-2025-38115", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38115" }, { "cve": "CVE-2025-38116", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38116" }, { "cve": "CVE-2025-38117", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38117" }, { "cve": "CVE-2025-38118", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38118" }, { "cve": "CVE-2025-38119", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38119" }, { "cve": "CVE-2025-38120", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38120" }, { "cve": "CVE-2025-38121", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38121" }, { "cve": "CVE-2025-38122", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38122" }, { "cve": "CVE-2025-38123", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38123" }, { "cve": "CVE-2025-38124", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38124" }, { "cve": "CVE-2025-38125", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38125" }, { "cve": "CVE-2025-38126", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38126" }, { "cve": "CVE-2025-38127", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38127" }, { "cve": "CVE-2025-38128", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38128" }, { "cve": "CVE-2025-38129", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38129" }, { "cve": "CVE-2025-38130", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38130" }, { "cve": "CVE-2025-38131", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38131" }, { "cve": "CVE-2025-38132", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38132" }, { "cve": "CVE-2025-38133", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38133" }, { "cve": "CVE-2025-38134", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38134" }, { "cve": "CVE-2025-38135", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38135" }, { "cve": "CVE-2025-38136", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38136" }, { "cve": "CVE-2025-38137", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38137" }, { "cve": "CVE-2025-38138", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38138" }, { "cve": "CVE-2025-38139", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38139" }, { "cve": "CVE-2025-38140", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38140" }, { "cve": "CVE-2025-38141", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38141" }, { "cve": "CVE-2025-38142", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38142" }, { "cve": "CVE-2025-38143", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38143" }, { "cve": "CVE-2025-38144", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38144" }, { "cve": "CVE-2025-38145", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38145" }, { "cve": "CVE-2025-38146", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38146" }, { "cve": "CVE-2025-38147", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38147" }, { "cve": "CVE-2025-38148", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38148" }, { "cve": "CVE-2025-38149", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38149" }, { "cve": "CVE-2025-38150", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38150" }, { "cve": "CVE-2025-38151", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38151" }, { "cve": "CVE-2025-38153", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38153" }, { "cve": "CVE-2025-38154", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38154" }, { "cve": "CVE-2025-38155", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38155" }, { "cve": "CVE-2025-38156", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38156" }, { "cve": "CVE-2025-38157", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38157" }, { "cve": "CVE-2025-38158", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38158" }, { "cve": "CVE-2025-38159", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38159" }, { "cve": "CVE-2025-38160", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38160" }, { "cve": "CVE-2025-38161", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38161" }, { "cve": "CVE-2025-38162", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38162" }, { "cve": "CVE-2025-38163", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38163" }, { "cve": "CVE-2025-38164", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38164" }, { "cve": "CVE-2025-38165", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38165" }, { "cve": "CVE-2025-38166", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38166" }, { "cve": "CVE-2025-38167", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38167" }, { "cve": "CVE-2025-38168", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38168" }, { "cve": "CVE-2025-38169", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38169" }, { "cve": "CVE-2025-38170", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38170" }, { "cve": "CVE-2025-38171", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38171" }, { "cve": "CVE-2025-38172", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38172" }, { "cve": "CVE-2025-38173", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T045032", "T004914" ] }, "release_date": "2025-07-02T22:00:00.000+00:00", "title": "CVE-2025-38173" } ] }
fkie_cve-2025-38133
Vulnerability from fkie_nvd
Published
2025-07-03 09:15
Modified
2025-07-03 15:13
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
iio: adc: ad4851: fix ad4858 chan pointer handling
The pointer returned from ad4851_parse_channels_common() is incremented
internally as each channel is populated. In ad4858_parse_channels(),
the same pointer was further incremented while setting ext_scan_type
fields for each channel. This resulted in indio_dev->channels being set
to a pointer past the end of the allocated array, potentially causing
memory corruption or undefined behavior.
Fix this by iterating over the channels using an explicit index instead
of incrementing the pointer. This preserves the original base pointer
and ensures all channel metadata is set correctly.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ad4851: fix ad4858 chan pointer handling\n\nThe pointer returned from ad4851_parse_channels_common() is incremented\ninternally as each channel is populated. In ad4858_parse_channels(),\nthe same pointer was further incremented while setting ext_scan_type\nfields for each channel. This resulted in indio_dev-\u003echannels being set\nto a pointer past the end of the allocated array, potentially causing\nmemory corruption or undefined behavior.\n\nFix this by iterating over the channels using an explicit index instead\nof incrementing the pointer. This preserves the original base pointer\nand ensures all channel metadata is set correctly." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: adc: ad4851: correcci\u00f3n del manejo del puntero de canal ad4858. El puntero devuelto por ad4851_parse_channels_common() se incrementa internamente a medida que se rellena cada canal. En ad4858_parse_channels(), el mismo puntero se increment\u00f3 a\u00fan m\u00e1s al configurar los campos ext_scan_type para cada canal. Esto provoc\u00f3 que indio_dev-\u0026gt;channels se configurara en un puntero m\u00e1s all\u00e1 del final de la matriz asignada, lo que podr\u00eda causar corrupci\u00f3n de memoria o un comportamiento indefinido. Corrija esto iterando sobre los canales utilizando un \u00edndice expl\u00edcito en lugar de incrementar el puntero. Esto preserva el puntero base original y garantiza que todos los metadatos del canal se configuren correctamente." } ], "id": "CVE-2025-38133", "lastModified": "2025-07-03T15:13:53.147", "metrics": {}, "published": "2025-07-03T09:15:27.697", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/499a8cee812588905cc940837e69918c1649a19e" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/6c3b9e1167d072ce2d01cafec7866647cf8d3616" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
ghsa-2789-v55f-r7v6
Vulnerability from github
Published
2025-07-03 09:30
Modified
2025-07-03 09:30
VLAI Severity ?
Details
In the Linux kernel, the following vulnerability has been resolved:
iio: adc: ad4851: fix ad4858 chan pointer handling
The pointer returned from ad4851_parse_channels_common() is incremented internally as each channel is populated. In ad4858_parse_channels(), the same pointer was further incremented while setting ext_scan_type fields for each channel. This resulted in indio_dev->channels being set to a pointer past the end of the allocated array, potentially causing memory corruption or undefined behavior.
Fix this by iterating over the channels using an explicit index instead of incrementing the pointer. This preserves the original base pointer and ensures all channel metadata is set correctly.
{ "affected": [], "aliases": [ "CVE-2025-38133" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-03T09:15:27Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ad4851: fix ad4858 chan pointer handling\n\nThe pointer returned from ad4851_parse_channels_common() is incremented\ninternally as each channel is populated. In ad4858_parse_channels(),\nthe same pointer was further incremented while setting ext_scan_type\nfields for each channel. This resulted in indio_dev-\u003echannels being set\nto a pointer past the end of the allocated array, potentially causing\nmemory corruption or undefined behavior.\n\nFix this by iterating over the channels using an explicit index instead\nof incrementing the pointer. This preserves the original base pointer\nand ensures all channel metadata is set correctly.", "id": "GHSA-2789-v55f-r7v6", "modified": "2025-07-03T09:30:34Z", "published": "2025-07-03T09:30:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38133" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/499a8cee812588905cc940837e69918c1649a19e" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/6c3b9e1167d072ce2d01cafec7866647cf8d3616" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…