๐Ÿ” CVE Alert

CVE-2025-38482

UNKNOWN 0.0

comedi: das6402: Fix bit shift out of bounds

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: comedi: das6402: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: /* IRQs 2,3,5,6,7, 10,11,15 are valid for "enhanced" mode */ if ((1 << it->options[1]) & 0x8cec) { However, `it->options[i]` is an unchecked `int` value from userspace, so the shift amount could be negative or out of bounds. Fix the test by requiring `it->options[1]` to be within bounds before proceeding with the original test. Valid `it->options[1]` values that select the IRQ will be in the range [1,15]. The value 0 explicitly disables the use of interrupts.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 28, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
79e5e6addbb18bf56075f0ff552094a28636dd03 < a15e9c175f783298c4ee48146be6841335400406 79e5e6addbb18bf56075f0ff552094a28636dd03 < de8da1063cce9234d55c8270d9bdf4cf84411c80 79e5e6addbb18bf56075f0ff552094a28636dd03 < 73f34d609397805c20d6b2ef5c07a4cbf7c4d63a 79e5e6addbb18bf56075f0ff552094a28636dd03 < a18a42e77545afcacd6a2b8d9fc16191b87454df 79e5e6addbb18bf56075f0ff552094a28636dd03 < 8a3637027ceeba4ca5e500b23cb7d24c25592513 79e5e6addbb18bf56075f0ff552094a28636dd03 < 3eab654f5d199ecd45403c6588cda63e491fcfca 79e5e6addbb18bf56075f0ff552094a28636dd03 < 4a3c18cde02e35aba87e0ad5672b3e1c72dda5a4 79e5e6addbb18bf56075f0ff552094a28636dd03 < 70f2b28b5243df557f51c054c20058ae207baaac
Linux / Linux
3.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a15e9c175f783298c4ee48146be6841335400406 git.kernel.org: https://git.kernel.org/stable/c/de8da1063cce9234d55c8270d9bdf4cf84411c80 git.kernel.org: https://git.kernel.org/stable/c/73f34d609397805c20d6b2ef5c07a4cbf7c4d63a git.kernel.org: https://git.kernel.org/stable/c/a18a42e77545afcacd6a2b8d9fc16191b87454df git.kernel.org: https://git.kernel.org/stable/c/8a3637027ceeba4ca5e500b23cb7d24c25592513 git.kernel.org: https://git.kernel.org/stable/c/3eab654f5d199ecd45403c6588cda63e491fcfca git.kernel.org: https://git.kernel.org/stable/c/4a3c18cde02e35aba87e0ad5672b3e1c72dda5a4 git.kernel.org: https://git.kernel.org/stable/c/70f2b28b5243df557f51c054c20058ae207baaac lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html