U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-38530 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: comedi: pcl812: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: if ((1 << it->options[1]) & board->irq_bits) { However, `it->options[i]` is an unchecked `int` value from userspace, so the shift amount could be negative or out of bounds. Fix the test by requiring `it->options[1]` to be within bounds before proceeding with the original test. Valid `it->options[1]` values that select the IRQ will be in the range [1,15]. The value 0 explicitly disables the use of interrupts.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/0489c30d080f07cc7f09d04de723d8c2ccdb61ef kernel.org
https://git.kernel.org/stable/c/16c173abee315953fd17a279352fec4a1faee862 kernel.org
https://git.kernel.org/stable/c/29ef03e5b84431171d6b77b822985b54bc44b793 kernel.org
https://git.kernel.org/stable/c/374d9b3eb4b08407997ef1fce96119d31e0c0bc4 kernel.org
https://git.kernel.org/stable/c/5bfa301e1e59a9b1a7b62a800b54852337c97416 kernel.org
https://git.kernel.org/stable/c/7e470d8efd10725b189ca8951973a8425932398a kernel.org
https://git.kernel.org/stable/c/a27e27eee313fe1c450b6af1e80e64412546cab4 kernel.org
https://git.kernel.org/stable/c/b14b076ce593f72585412fc7fd3747e03a5e3632 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-38530
NVD Published Date:
08/16/2025
NVD Last Modified:
08/28/2025
Source:
kernel.org