-
CVE-2025-38480
- EPSS 0.04%
- Published 28.07.2025 11:21:45
- Last modified 28.08.2025 15:15:50
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: comedi: Fix use of uninitialized data in insn_rw_emulate_bits() For Comedi `INSN_READ` and `INSN_WRITE` instructions on "digital" subdevices (subdevice types `COMEDI_SUBD_DI`, `COMEDI_SUBD_DO`, and `COMEDI_SUBD_DIO`), it is common for the subdevice driver not to have `insn_read` and `insn_write` handler functions, but to have an `insn_bits` handler function for handling Comedi `INSN_BITS` instructions. In that case, the subdevice's `insn_read` and/or `insn_write` function handler pointers are set to point to the `insn_rw_emulate_bits()` function by `__comedi_device_postconfig()`. For `INSN_WRITE`, `insn_rw_emulate_bits()` currently assumes that the supplied `data[0]` value is a valid copy from user memory. It will at least exist because `do_insnlist_ioctl()` and `do_insn_ioctl()` in "comedi_fops.c" ensure at lease `MIN_SAMPLES` (16) elements are allocated. However, if `insn->n` is 0 (which is allowable for `INSN_READ` and `INSN_WRITE` instructions, then `data[0]` may contain uninitialized data, and certainly contains invalid data, possibly from a different instruction in the array of instructions handled by `do_insnlist_ioctl()`. This will result in an incorrect value being written to the digital output channel (or to the digital input/output channel if configured as an output), and may be reflected in the internal saved state of the channel. Fix it by returning 0 early if `insn->n` is 0, before reaching the code that accesses `data[0]`. Previously, the function always returned 1 on success, but it is supposed to be the number of data samples actually read or written up to `insn->n`, which is 0 in this case.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
4c2981bf30401adfcdbfece4ab6f411f7c5875a1
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
16256d7efcf7acc9f39abe21522c4c6b77f67c00
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
c53570e62b5b28bdb56bb563190227f8307817a5
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
3050d197d6bc9ef128944a70210f42d2430b3000
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
10f9024a8c824a41827fff1fefefb314c98e2c88
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
2af1e7d389c2619219171d23f5b96dbcbb7f9656
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
3ab55ffaaf75d0c7b68e332c1cdcc1b0e0044870
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
e9cb26291d009243a4478a7ffb37b3a9175bfce9
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.29
Status
affected
Version <
2.6.29
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.297
Status
unaffected
Version <=
5.10.*
Version
5.10.241
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.147
Status
unaffected
Version <=
6.6.*
Version
6.6.100
Status
unaffected
Version <=
6.12.*
Version
6.12.40
Status
unaffected
Version <=
6.15.*
Version
6.15.8
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.103 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|