CVE-2025-38529
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-16

Last updated on: 2025-11-03

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: comedi: aio_iiro_16: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: if ((1 << it->options[1]) & 0xdcfc) { However, `it->options[i]` is an unchecked `int` value from userspace, so the shift amount could be negative or out of bounds. Fix the test by requiring `it->options[1]` to be within bounds before proceeding with the original test. Valid `it->options[1]` values that select the IRQ will be in the range [1,15]. The value 0 explicitly disables the use of interrupts.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-16
Last Modified
2025-11-03
Generated
2026-05-06
AI Q&A
2025-08-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linux linux_kernel 5.10.244
linux linux_kernel 6.1.153
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's comedi aio_iiro_16 driver, where a bit shift operation uses an unchecked integer value from userspace as the shift amount. Because the value is not validated, it can be negative or out of bounds, leading to a bit shift out of bounds error. The fix involves validating that the shift amount is within the valid range [1,15] before performing the bit shift operation.


How can this vulnerability impact me? :

The vulnerability could cause unexpected behavior or crashes in the Linux kernel due to invalid bit shift operations. This may lead to system instability or potential denial of service if exploited by providing out-of-bounds shift values from userspace.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the comedi aio_iiro_16 bit shift out of bounds issue. Ensure that the kernel properly validates the it->options[1] value to be within the range [1,15] before performing bit shift operations. Avoid using untrusted userspace inputs that can provide out-of-bounds values for it->options[1].


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart