CVE-2025-38481
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/07/2025
Last modified:
07/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large<br />
<br />
The handling of the `COMEDI_INSNLIST` ioctl allocates a kernel buffer to<br />
hold the array of `struct comedi_insn`, getting the length from the<br />
`n_insns` member of the `struct comedi_insnlist` supplied by the user.<br />
The allocation will fail with a WARNING and a stack dump if it is too<br />
large.<br />
<br />
Avoid that by failing with an `-EINVAL` error if the supplied `n_insns`<br />
value is unreasonable.<br />
<br />
Define the limit on the `n_insns` value in the `MAX_INSNS` macro. Set<br />
this to the same value as `MAX_SAMPLES` (65536), which is the maximum<br />
allowed sum of the values of the member `n` in the array of `struct<br />
comedi_insn`, and sensible comedi instructions will have an `n` of at<br />
least 1.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.29 (including) | 5.4.297 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.241 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.190 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.147 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.100 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.40 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/08ae4b20f5e82101d77326ecab9089e110f224cc
- https://git.kernel.org/stable/c/454d732dfd0aef7d7aa950c409215ca06d717e93
- https://git.kernel.org/stable/c/69dc06b9514522de532e997a21d035cd29b0db44
- https://git.kernel.org/stable/c/992d600f284e719242a434166e86c1999649b71c
- https://git.kernel.org/stable/c/c68257588e87f45530235701a42496b7e9e56adb
- https://git.kernel.org/stable/c/c9d3d9667443caafa804cd07940aeaef8e53aa90
- https://git.kernel.org/stable/c/d4c73ce13f5b5a0fe0319f1f352ff602f0ace8e3
- https://git.kernel.org/stable/c/e3b8322cc8081d142ee4c1a43e1d702bdba1ed76
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



