U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-38482 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: comedi: das6402: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: /* IRQs 2,3,5,6,7, 10,11,15 are valid for "enhanced" mode */ if ((1 << it->options[1]) & 0x8cec) { However, `it->options[i]` is an unchecked `int` value from userspace, so the shift amount could be negative or out of bounds. Fix the test by requiring `it->options[1]` to be within bounds before proceeding with the original test. Valid `it->options[1]` values that select the IRQ will be in the range [1,15]. The value 0 explicitly disables the use of interrupts.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/3eab654f5d199ecd45403c6588cda63e491fcfca kernel.org
https://git.kernel.org/stable/c/4a3c18cde02e35aba87e0ad5672b3e1c72dda5a4 kernel.org
https://git.kernel.org/stable/c/70f2b28b5243df557f51c054c20058ae207baaac kernel.org
https://git.kernel.org/stable/c/73f34d609397805c20d6b2ef5c07a4cbf7c4d63a kernel.org
https://git.kernel.org/stable/c/8a3637027ceeba4ca5e500b23cb7d24c25592513 kernel.org
https://git.kernel.org/stable/c/a15e9c175f783298c4ee48146be6841335400406 kernel.org
https://git.kernel.org/stable/c/a18a42e77545afcacd6a2b8d9fc16191b87454df kernel.org
https://git.kernel.org/stable/c/de8da1063cce9234d55c8270d9bdf4cf84411c80 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-38482
NVD Published Date:
07/28/2025
NVD Last Modified:
08/28/2025
Source:
kernel.org