CVE-2025-40114
iio: light: Add check for array bounds in veml6075_read_int_time_ms
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: iio: light: Add check for array bounds in veml6075_read_int_time_ms The array contains only 5 elements, but the index calculated by
veml6075_read_int_time_index can range from 0 to 7,
which could lead to out-of-bounds access. The check prevents this issue. Coverity Issue
CID 1574309: (#1 of 1): Out-of-bounds read (OVERRUN)
overrun-local: Overrunning array veml6075_it_ms of 5 4-byte
elements at element index 7 (byte offset 31) using
index int_index (which evaluates to 7) This is hardening against potentially broken hardware. Good to have
but not necessary to backport.
En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: light: Agregar comprobación de los límites de matriz en veml6075_read_int_time_ms La matriz contiene solo 5 elementos, pero el índice calculado por veml6075_read_int_time_index puede variar de 0 a 7, lo que podría provocar un acceso fuera de los límites. La comprobación evita este problema. Coverity Issue CID 1574309: (#1 de 1): Lectura fuera de los límites (OVERRUN) overrun-local: Desbordamiento de la matriz veml6075_it_ms de 5 elementos de 4 bytes en el índice de elemento 7 (desplazamiento de byte 31) utilizando el índice int_index (que evalúa a 7) Esto es endurecimiento contra hardware potencialmente dañado. Es bueno tenerlo, pero no es necesario retroportarlo.
In the Linux kernel, the following vulnerability has been resolved: iio: light: Add check for array bounds in veml6075_read_int_time_ms The array contains only 5 elements, but the index calculated by veml6075_read_int_time_index can range from 0 to 7, which could lead to out-of-bounds access. The check prevents this issue. Coverity Issue CID 1574309: (#1 of 1): Out-of-bounds read (OVERRUN) overrun-local: Overrunning array veml6075_it_ms of 5 4-byte elements at element index 7 (byte offset 31) using index int_index (which evaluates to 7) This is hardening against potentially broken hardware. Good to have but not necessary to backport.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2025-04-16 CVE Reserved
- 2025-04-18 CVE Published
- 2025-04-30 EPSS Updated
- 2025-05-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://git.kernel.org/stable/c/3b82f43238aecd73464aeacc9c73407079511533 | Vuln. Introduced |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.8 < 6.12.23 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.8 < 6.12.23" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.8 < 6.13.11 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.8 < 6.13.11" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.8 < 6.14.2 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.8 < 6.14.2" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.8 < 6.15-rc1 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.8 < 6.15-rc1" | en |
Affected
|