{"vulnerability": "CVE-2025-40114", "sightings": [{"uuid": "c3bfbb4a-f202-4edc-b67b-3cf4b5d70ac0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40114", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12395", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-40114\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\niio: light: Add check for array bounds in veml6075_read_int_time_ms\n\nThe array contains only 5 elements, but the index calculated by\nveml6075_read_int_time_index can range from 0 to 7,\nwhich could lead to out-of-bounds access. The check prevents this issue.\n\nCoverity Issue\nCID 1574309: (#1 of 1): Out-of-bounds read (OVERRUN)\noverrun-local: Overrunning array veml6075_it_ms of 5 4-byte\nelements at element index 7 (byte offset 31) using\nindex int_index (which evaluates to 7)\n\nThis is hardening against potentially broken hardware. Good to have\nbut not necessary to backport.\n\ud83d\udccf Published: 2025-04-18T07:01:40.964Z\n\ud83d\udccf Modified: 2025-04-18T07:01:40.964Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/7a40b52d4442178bee0cf1c36bc450ab951cef0f\n2. https://git.kernel.org/stable/c/18a08b5632809faa671279b3cd27d5f96cc5a3f0\n3. https://git.kernel.org/stable/c/9c40a68b7f97fa487e6c7e67fcf4f846a1f96692\n4. https://git.kernel.org/stable/c/ee735aa33db16c1fb5ebccbaf84ad38f5583f3cc", "creation_timestamp": "2025-04-18T07:59:07.000000Z"}]}