CVE-2025-39685

In the Linux kernel, the following vulnerability has been resolved: comedi: pcl726: Prevent invalid irq number The reproducer passed in an irq number(0x80008000) that was too large, which triggered the oob. Added an interrupt number check to prevent users from passing in an irq number that was too large. If `it->options[1]` is 31, then `1 << it->options[1]` is still invalid because it shifts a 1-bit into the sign bit (which is UB in C). Possible solutions include reducing the upper bound on the `it->options[1]` value to 30 or lower, or using `1U << it->options[1]`. The old code would just not attempt to request the IRQ if the `options[1]` value were invalid. And it would still configure the device without interrupts even if the call to `request_irq` returned an error. So it would be better to combine this test with the test below.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

08 Jan 2026, 15:11

Type Values Removed Values Added
CWE CWE-125
References () https://git.kernel.org/stable/c/0eb4ed2aa261dee228f1668dbfa6d87353e8162d - () https://git.kernel.org/stable/c/0eb4ed2aa261dee228f1668dbfa6d87353e8162d - Patch
References () https://git.kernel.org/stable/c/5a33d07c94ba91306093e823112a7aa9727549f6 - () https://git.kernel.org/stable/c/5a33d07c94ba91306093e823112a7aa9727549f6 - Patch
References () https://git.kernel.org/stable/c/96cb948408b3adb69df7e451ba7da9d21f814d00 - () https://git.kernel.org/stable/c/96cb948408b3adb69df7e451ba7da9d21f814d00 - Patch
References () https://git.kernel.org/stable/c/a3cfcd0c78c80ca7cd80372dc28f77d01be57bf6 - () https://git.kernel.org/stable/c/a3cfcd0c78c80ca7cd80372dc28f77d01be57bf6 - Patch
References () https://git.kernel.org/stable/c/bab220b0bb5af652007e278e8e8357f952b0e1ea - () https://git.kernel.org/stable/c/bab220b0bb5af652007e278e8e8357f952b0e1ea - Patch
References () https://git.kernel.org/stable/c/d8992c9a01f81128f36acb7c5755530e21fcd059 - () https://git.kernel.org/stable/c/d8992c9a01f81128f36acb7c5755530e21fcd059 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

05 Sep 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-05 18:15

Updated : 2026-01-08 15:11


NVD link : CVE-2025-39685

Mitre link : CVE-2025-39685

CVE.ORG link : CVE-2025-39685


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read