Impact
The vulnerability arises from a NULL pointer dereference in the adis driver initialization routine. When the driver ifad itialises, it assumes that an operation structure is present and immediately dereferences it to inspect function pointers. If the ops pointer is null—as is the case when the driver has not yet provided custom operations—a kernel panic occurs. This expands the impact to a complete loss of kernel stability, effectively denying service to the affected host. The weakness is a classic Null Pointer Dereference.
Affected Systems
All Linux kernel installations that include the IIO IMU drivers for ADIS devices such as adis16480, adis16490, adis16545, and related sensors are affected. The flaw exists in any kernel that incorporates these drivers without the recent patch, regardless of distribution or vendor kernel version. The precise range of affected kernel versions is not specified in the advisory, but any build compiled with the unpatched code is vulnerable.
Risk and Exploitability
The exploit path requires access to the device driver subsystem, which generally implies local or privileged access to the machine. No public exploits or vulnerability exploitation guide are known, and the EPSS score is not available, so the likelihood of an attacker successfully leveraging this flaw is uncertain. The issue is not listed in the CISA Known Exploited Vulnerabilities catalog. Nonetheless, the kernel crash could be triggered by a malicious device or software component that interacts with the ADIS sensors, so the risk remains significant for systems that rely on persistent availability.
OpenCVE Enrichment