In the Linux kernel, the following vulnerability has been resolved:
comedi: das16m1: Fix bit shift out of bounds
When checking for a supported IRQ number, the following test is used:
/* only irqs 2, 3, 4, 5, 6, 7, 10, 11, 12, 14, and 15 are valid */
if ((1 << it->options[1]) & 0xdcfc) {
However, `it->options[i]` is an unchecked `int` value from userspace, so
the shift amount could be negative or out of bounds. Fix the test by
requiring `it->options[1]` to be within bounds before proceeding with
the original test.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Jan 2026, 16:25
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* |
|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | CWE-125 | |
| References | () https://git.kernel.org/stable/c/076b13ee60eb01ed0d140ef261f95534562a3077 - Patch | |
| References | () https://git.kernel.org/stable/c/539bdff832adac9ea653859fa0b6bc62e743329c - Patch | |
| References | () https://git.kernel.org/stable/c/65c03e6fc524eb2868abedffd8a4613d78abc288 - Patch | |
| References | () https://git.kernel.org/stable/c/adb7df8a8f9d788423e161b779764527dd3ec2d0 - Patch | |
| References | () https://git.kernel.org/stable/c/b3c95fa508e5dc3da60520eea92a5241095ceef1 - Patch | |
| References | () https://git.kernel.org/stable/c/d1291c69f46d6572b2cf75960dd8975d7ab2176b - Patch | |
| References | () https://git.kernel.org/stable/c/ed93c6f68a3be06e4e0c331c6e751f462dee3932 - Patch | |
| References | () https://git.kernel.org/stable/c/f211572818ed5bec2b3f5d4e0719ef8699b3c269 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
28 Aug 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
29 Jul 2025, 14:14
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
28 Jul 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-28 12:15
Updated : 2026-01-07 16:25
NVD link : CVE-2025-38483
Mitre link : CVE-2025-38483
CVE.ORG link : CVE-2025-38483
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
