CVE-2025-38529
BaseFortify
Publication date: 2025-08-16
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10.244 |
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's comedi aio_iiro_16 driver, where a bit shift operation uses an unchecked integer value from userspace as the shift amount. Because the value is not validated, it can be negative or out of bounds, leading to a bit shift out of bounds error. The fix involves validating that the shift amount is within the valid range [1,15] before performing the bit shift operation.
How can this vulnerability impact me? :
The vulnerability could cause unexpected behavior or crashes in the Linux kernel due to invalid bit shift operations. This may lead to system instability or potential denial of service if exploited by providing out-of-bounds shift values from userspace.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the comedi aio_iiro_16 bit shift out of bounds issue. Ensure that the kernel properly validates the it->options[1] value to be within the range [1,15] before performing bit shift operations. Avoid using untrusted userspace inputs that can provide out-of-bounds values for it->options[1].