CVE-2025-38481
BaseFortify
Publication date: 2025-07-28
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of the COMEDI_INSNLIST ioctl. When a user supplies a very large value for the number of instructions (n_insns) in a comedi_insnlist structure, the kernel attempts to allocate a buffer that is too large, which can cause a failure with a warning and stack dump. The fix is to reject unreasonable n_insns values by returning an -EINVAL error, preventing the kernel from attempting to allocate excessively large buffers.
How can this vulnerability impact me? :
If exploited, this vulnerability could cause the Linux kernel to fail when handling certain ioctl calls, potentially leading to kernel warnings and stack dumps. This could result in denial of service or instability in systems using the COMEDI driver, affecting system reliability.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version where the comedi subsystem properly validates the n_insns value in the COMEDI_INSNLIST ioctl, ensuring it fails with -EINVAL if the value is too large. This prevents kernel buffer allocation failures and stack dumps caused by unreasonable n_insns values.