CVE-2025-38481

In the Linux kernel, the following vulnerability has been resolved: comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large The handling of the `COMEDI_INSNLIST` ioctl allocates a kernel buffer to hold the array of `struct comedi_insn`, getting the length from the `n_insns` member of the `struct comedi_insnlist` supplied by the user. The allocation will fail with a WARNING and a stack dump if it is too large. Avoid that by failing with an `-EINVAL` error if the supplied `n_insns` value is unreasonable. Define the limit on the `n_insns` value in the `MAX_INSNS` macro. Set this to the same value as `MAX_SAMPLES` (65536), which is the maximum allowed sum of the values of the member `n` in the array of `struct comedi_insn`, and sensible comedi instructions will have an `n` of at least 1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 16:24

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/08ae4b20f5e82101d77326ecab9089e110f224cc - () https://git.kernel.org/stable/c/08ae4b20f5e82101d77326ecab9089e110f224cc - Patch
References () https://git.kernel.org/stable/c/454d732dfd0aef7d7aa950c409215ca06d717e93 - () https://git.kernel.org/stable/c/454d732dfd0aef7d7aa950c409215ca06d717e93 - Patch
References () https://git.kernel.org/stable/c/69dc06b9514522de532e997a21d035cd29b0db44 - () https://git.kernel.org/stable/c/69dc06b9514522de532e997a21d035cd29b0db44 - Patch
References () https://git.kernel.org/stable/c/992d600f284e719242a434166e86c1999649b71c - () https://git.kernel.org/stable/c/992d600f284e719242a434166e86c1999649b71c - Patch
References () https://git.kernel.org/stable/c/c68257588e87f45530235701a42496b7e9e56adb - () https://git.kernel.org/stable/c/c68257588e87f45530235701a42496b7e9e56adb - Patch
References () https://git.kernel.org/stable/c/c9d3d9667443caafa804cd07940aeaef8e53aa90 - () https://git.kernel.org/stable/c/c9d3d9667443caafa804cd07940aeaef8e53aa90 - Patch
References () https://git.kernel.org/stable/c/d4c73ce13f5b5a0fe0319f1f352ff602f0ace8e3 - () https://git.kernel.org/stable/c/d4c73ce13f5b5a0fe0319f1f352ff602f0ace8e3 - Patch
References () https://git.kernel.org/stable/c/e3b8322cc8081d142ee4c1a43e1d702bdba1ed76 - () https://git.kernel.org/stable/c/e3b8322cc8081d142ee4c1a43e1d702bdba1ed76 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/454d732dfd0aef7d7aa950c409215ca06d717e93 -
  • () https://git.kernel.org/stable/c/69dc06b9514522de532e997a21d035cd29b0db44 -
  • () https://git.kernel.org/stable/c/c68257588e87f45530235701a42496b7e9e56adb -

29 Jul 2025, 14:14

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: comedi: Error en el ioctl COMEDI_INSNLIST si n_insns es demasiado grande El manejo del ioctl `COMEDI_INSNLIST` asigna un búfer del kernel para contener la matriz de `struct comedi_insn`, obteniendo la longitud del miembro `n_insns` de la `struct comedi_insnlist` proporcionada por el usuario. La asignación fallará con un WARNING y un volcado de pila si es demasiado grande. Evítelo fallando con un error `-EINVAL` si el valor `n_insns` proporcionado no es razonable. Defina el límite en el valor `n_insns` en la macro `MAX_INSNS`. Establezca esto en el mismo valor que `MAX_SAMPLES` (65536), que es la suma máxima permitida de los valores del miembro `n` en la matriz de `struct comedi_insn`, y las instrucciones comedi sensatas tendrán un `n` de al menos 1.

28 Jul 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-28 12:15

Updated : 2026-01-07 16:24


NVD link : CVE-2025-38481

Mitre link : CVE-2025-38481

CVE.ORG link : CVE-2025-38481


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel