CVE-2025-38480
BaseFortify
Publication date: 2025-07-28
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| comedi | comedi | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's Comedi subsystem, specifically in the function insn_rw_emulate_bits(). When handling certain digital input/output instructions (INSN_READ and INSN_WRITE) on digital subdevices, the function may use uninitialized data if the number of samples (insn->n) is zero. This can cause invalid or incorrect data to be written to digital output channels or internal state, because the function assumes data[0] is valid without checking if insn->n is zero. The fix is to return early if insn->n is zero to avoid using uninitialized data.
How can this vulnerability impact me? :
This vulnerability can cause incorrect values to be written to digital output channels or digital input/output channels configured as output. This means that the device's digital outputs may behave unpredictably or incorrectly, potentially leading to malfunction or incorrect operation of hardware relying on these outputs.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the comedi subsystem has been fixed to properly handle insn_rw_emulate_bits() by returning early when insn->n is 0, preventing use of uninitialized data. This typically means applying the latest kernel patches or upgrading to a kernel version released after 2025-07-28 that includes this fix.