-
CVE-2025-38478
- EPSS 0.04%
- Published 28.07.2025 11:21:44
- Last modified 28.08.2025 15:15:49
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: comedi: Fix initialization of data for instructions that write to subdevice Some Comedi subdevice instruction handlers are known to access instruction data elements beyond the first `insn->n` elements in some cases. The `do_insn_ioctl()` and `do_insnlist_ioctl()` functions allocate at least `MIN_SAMPLES` (16) data elements to deal with this, but they do not initialize all of that. For Comedi instruction codes that write to the subdevice, the first `insn->n` data elements are copied from user-space, but the remaining elements are left uninitialized. That could be a problem if the subdevice instruction handler reads the uninitialized data. Ensure that the first `MIN_SAMPLES` elements are initialized before calling these instruction handlers, filling the uncopied elements with 0. For `do_insnlist_ioctl()`, the same data buffer elements are used for handling a list of instructions, so ensure the first `MIN_SAMPLES` elements are initialized for each instruction that writes to the subdevice.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
6f38c6380c3b38a05032b8881e41137385a6ce02
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
13e4d9038a1e869445a996a3f604a84ef52fe8f4
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
020eed5681d0f9bced73970368078a92d6cfaa9c
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
d3436638738ace8f101af7bdee2eae1bc38e9b29
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
673ee92bd2d31055bca98a1d96b653f5284289c4
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
c42116dc70af6664526f7aa82cf937824ab42649
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
fe8713fb4e4e82a4f91910d9a41bf0613e69a0b9
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
46d8c744136ce2454aa4c35c138cc06817f92b8e
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.29
Status
affected
Version <
2.6.29
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.297
Status
unaffected
Version <=
5.10.*
Version
5.10.241
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.147
Status
unaffected
Version <=
6.6.*
Version
6.6.100
Status
unaffected
Version <=
6.12.*
Version
6.12.40
Status
unaffected
Version <=
6.15.*
Version
6.15.8
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.103 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|