CVE-2025-39685
BaseFortify
Publication date: 2025-09-05
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's comedi pcl726 driver involves an invalid interrupt request (IRQ) number being passed, which is too large and causes an out-of-bounds (OOB) error. Specifically, if the irq number or the value in it->options[1] is too large (e.g., 31), it causes an invalid bit shift operation leading to undefined behavior in C. The fix involves adding checks to prevent users from passing such invalid irq numbers and ensuring proper handling of the IRQ request.
How can this vulnerability impact me? :
This vulnerability can cause undefined behavior in the kernel due to invalid IRQ numbers, potentially leading to system instability or incorrect device operation. Since the device could be configured without proper interrupt handling, it might result in malfunctioning hardware or degraded system performance.