CVE-2025-38481

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/07/2025
Last modified:
07/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large<br /> <br /> The handling of the `COMEDI_INSNLIST` ioctl allocates a kernel buffer to<br /> hold the array of `struct comedi_insn`, getting the length from the<br /> `n_insns` member of the `struct comedi_insnlist` supplied by the user.<br /> The allocation will fail with a WARNING and a stack dump if it is too<br /> large.<br /> <br /> Avoid that by failing with an `-EINVAL` error if the supplied `n_insns`<br /> value is unreasonable.<br /> <br /> Define the limit on the `n_insns` value in the `MAX_INSNS` macro. Set<br /> this to the same value as `MAX_SAMPLES` (65536), which is the maximum<br /> allowed sum of the values of the member `n` in the array of `struct<br /> comedi_insn`, and sensible comedi instructions will have an `n` of at<br /> least 1.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.29 (including) 5.4.297 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.241 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.190 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.147 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.100 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.40 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.8 (excluding)
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*