-
CVE-2025-38481
- EPSS 0.04%
- Veröffentlicht 28.07.2025 11:21:46
- Zuletzt bearbeitet 28.08.2025 15:15:50
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large The handling of the `COMEDI_INSNLIST` ioctl allocates a kernel buffer to hold the array of `struct comedi_insn`, getting the length from the `n_insns` member of the `struct comedi_insnlist` supplied by the user. The allocation will fail with a WARNING and a stack dump if it is too large. Avoid that by failing with an `-EINVAL` error if the supplied `n_insns` value is unreasonable. Define the limit on the `n_insns` value in the `MAX_INSNS` macro. Set this to the same value as `MAX_SAMPLES` (65536), which is the maximum allowed sum of the values of the member `n` in the array of `struct comedi_insn`, and sensible comedi instructions will have an `n` of at least 1.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
454d732dfd0aef7d7aa950c409215ca06d717e93
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
c68257588e87f45530235701a42496b7e9e56adb
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
69dc06b9514522de532e997a21d035cd29b0db44
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
d4c73ce13f5b5a0fe0319f1f352ff602f0ace8e3
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
c9d3d9667443caafa804cd07940aeaef8e53aa90
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
992d600f284e719242a434166e86c1999649b71c
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
e3b8322cc8081d142ee4c1a43e1d702bdba1ed76
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
Version <
08ae4b20f5e82101d77326ecab9089e110f224cc
Version
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.29
Status
affected
Version <
2.6.29
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.297
Status
unaffected
Version <=
5.10.*
Version
5.10.241
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.147
Status
unaffected
Version <=
6.6.*
Version
6.6.100
Status
unaffected
Version <=
6.12.*
Version
6.12.40
Status
unaffected
Version <=
6.15.*
Version
6.15.8
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.103 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|