-

CVE-2025-38478

In the Linux kernel, the following vulnerability has been resolved:

comedi: Fix initialization of data for instructions that write to subdevice

Some Comedi subdevice instruction handlers are known to access
instruction data elements beyond the first `insn->n` elements in some
cases.  The `do_insn_ioctl()` and `do_insnlist_ioctl()` functions
allocate at least `MIN_SAMPLES` (16) data elements to deal with this,
but they do not initialize all of that.  For Comedi instruction codes
that write to the subdevice, the first `insn->n` data elements are
copied from user-space, but the remaining elements are left
uninitialized.  That could be a problem if the subdevice instruction
handler reads the uninitialized data.  Ensure that the first
`MIN_SAMPLES` elements are initialized before calling these instruction
handlers, filling the uncopied elements with 0.  For
`do_insnlist_ioctl()`, the same data buffer elements are used for
handling a list of instructions, so ensure the first `MIN_SAMPLES`
elements are initialized for each instruction that writes to the
subdevice.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 6f38c6380c3b38a05032b8881e41137385a6ce02
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < 13e4d9038a1e869445a996a3f604a84ef52fe8f4
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < 020eed5681d0f9bced73970368078a92d6cfaa9c
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < d3436638738ace8f101af7bdee2eae1bc38e9b29
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < 673ee92bd2d31055bca98a1d96b653f5284289c4
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < c42116dc70af6664526f7aa82cf937824ab42649
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < fe8713fb4e4e82a4f91910d9a41bf0613e69a0b9
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < 46d8c744136ce2454aa4c35c138cc06817f92b8e
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.29
Status affected
Version < 2.6.29
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.147
Status unaffected
Version <= 6.6.*
Version 6.6.100
Status unaffected
Version <= 6.12.*
Version 6.12.40
Status unaffected
Version <= 6.15.*
Version 6.15.8
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.103
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string