CVE-2025-38482
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-28

Last updated on: 2025-11-03

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: comedi: das6402: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: /* IRQs 2,3,5,6,7, 10,11,15 are valid for "enhanced" mode */ if ((1 << it->options[1]) & 0x8cec) { However, `it->options[i]` is an unchecked `int` value from userspace, so the shift amount could be negative or out of bounds. Fix the test by requiring `it->options[1]` to be within bounds before proceeding with the original test. Valid `it->options[1]` values that select the IRQ will be in the range [1,15]. The value 0 explicitly disables the use of interrupts.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-28
Last Modified
2025-11-03
Generated
2026-05-07
AI Q&A
2025-07-28
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

The vulnerability could lead to unexpected behavior or crashes in the Linux kernel due to invalid bit shift operations caused by unvalidated user input. This may potentially be exploited to cause denial of service or other unintended effects in systems using the affected driver.


Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's comedi das6402 driver. It involves an unchecked bit shift operation where a value from userspace (it->options[1]) is used as the shift amount without validation. Because this value can be negative or out of bounds, it can cause a bit shift out of bounds error. The fix requires validating that it->options[1] is within the range [1,15] before performing the bit shift, ensuring only valid IRQ numbers are used.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Linux kernel to a version where the comedi das6402 driver has been fixed to properly check the IRQ number bounds before performing bit shifts. Specifically, ensure that the kernel includes the patch that validates it->options[1] is within the range [1,15] before using it. Avoid using untrusted userspace input for IRQ options until the fix is applied.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart