Home

Description

In the Linux kernel, the following vulnerability has been resolved: comedi: das16m1: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: /* only irqs 2, 3, 4, 5, 6, 7, 10, 11, 12, 14, and 15 are valid */ if ((1 << it->options[1]) & 0xdcfc) { However, `it->options[i]` is an unchecked `int` value from userspace, so the shift amount could be negative or out of bounds. Fix the test by requiring `it->options[1]` to be within bounds before proceeding with the original test.

PUBLISHED Reserved 2025-04-16 | Published 2025-07-28 | Updated 2025-11-03 | Assigner Linux

Product status

Default status
unaffected

729988507680b2ce934bce61d9ce0ea7b235914c (git) before 539bdff832adac9ea653859fa0b6bc62e743329c
affected

729988507680b2ce934bce61d9ce0ea7b235914c (git) before d1291c69f46d6572b2cf75960dd8975d7ab2176b
affected

729988507680b2ce934bce61d9ce0ea7b235914c (git) before b3c95fa508e5dc3da60520eea92a5241095ceef1
affected

729988507680b2ce934bce61d9ce0ea7b235914c (git) before 65c03e6fc524eb2868abedffd8a4613d78abc288
affected

729988507680b2ce934bce61d9ce0ea7b235914c (git) before adb7df8a8f9d788423e161b779764527dd3ec2d0
affected

729988507680b2ce934bce61d9ce0ea7b235914c (git) before 076b13ee60eb01ed0d140ef261f95534562a3077
affected

729988507680b2ce934bce61d9ce0ea7b235914c (git) before f211572818ed5bec2b3f5d4e0719ef8699b3c269
affected

729988507680b2ce934bce61d9ce0ea7b235914c (git) before ed93c6f68a3be06e4e0c331c6e751f462dee3932
affected

Default status
affected

3.14
affected

Any version before 3.14
unaffected

5.4.297 (semver)
unaffected

5.10.241 (semver)
unaffected

5.15.190 (semver)
unaffected

6.1.147 (semver)
unaffected

6.6.100 (semver)
unaffected

6.12.40 (semver)
unaffected

6.15.8 (semver)
unaffected

6.16 (original_commit_for_fix)
unaffected

References

lists.debian.org/debian-lts-announce/2025/10/msg00008.html

lists.debian.org/debian-lts-announce/2025/10/msg00007.html

git.kernel.org/...c/539bdff832adac9ea653859fa0b6bc62e743329c

git.kernel.org/...c/d1291c69f46d6572b2cf75960dd8975d7ab2176b

git.kernel.org/...c/b3c95fa508e5dc3da60520eea92a5241095ceef1

git.kernel.org/...c/65c03e6fc524eb2868abedffd8a4613d78abc288

git.kernel.org/...c/adb7df8a8f9d788423e161b779764527dd3ec2d0

git.kernel.org/...c/076b13ee60eb01ed0d140ef261f95534562a3077

git.kernel.org/...c/f211572818ed5bec2b3f5d4e0719ef8699b3c269

git.kernel.org/...c/ed93c6f68a3be06e4e0c331c6e751f462dee3932

cve.org (CVE-2025-38483)

nvd.nist.gov (CVE-2025-38483)

Download JSON