-

CVE-2025-38481

In the Linux kernel, the following vulnerability has been resolved:

comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large

The handling of the `COMEDI_INSNLIST` ioctl allocates a kernel buffer to
hold the array of `struct comedi_insn`, getting the length from the
`n_insns` member of the `struct comedi_insnlist` supplied by the user.
The allocation will fail with a WARNING and a stack dump if it is too
large.

Avoid that by failing with an `-EINVAL` error if the supplied `n_insns`
value is unreasonable.

Define the limit on the `n_insns` value in the `MAX_INSNS` macro.  Set
this to the same value as `MAX_SAMPLES` (65536), which is the maximum
allowed sum of the values of the member `n` in the array of `struct
comedi_insn`, and sensible comedi instructions will have an `n` of at
least 1.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 454d732dfd0aef7d7aa950c409215ca06d717e93
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < c68257588e87f45530235701a42496b7e9e56adb
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < 69dc06b9514522de532e997a21d035cd29b0db44
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < d4c73ce13f5b5a0fe0319f1f352ff602f0ace8e3
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < c9d3d9667443caafa804cd07940aeaef8e53aa90
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < 992d600f284e719242a434166e86c1999649b71c
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < e3b8322cc8081d142ee4c1a43e1d702bdba1ed76
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
Version < 08ae4b20f5e82101d77326ecab9089e110f224cc
Version ed9eccbe8970f6eedc1b978c157caf1251a896d4
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.29
Status affected
Version < 2.6.29
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.147
Status unaffected
Version <= 6.6.*
Version 6.6.100
Status unaffected
Version <= 6.12.*
Version 6.12.40
Status unaffected
Version <= 6.15.*
Version 6.15.8
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.103
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String