CVE-2025-38481

Source
https://cve.org/CVERecord?id=CVE-2025-38481
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38481.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38481
Downstream
Related
Published
2025-07-28T11:21:46.147Z
Modified
2026-05-18T05:56:19.952678664Z
Summary
comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large
Details

In the Linux kernel, the following vulnerability has been resolved:

comedi: Fail COMEDIINSNLIST ioctl if ninsns is too large

The handling of the COMEDI_INSNLIST ioctl allocates a kernel buffer to hold the array of struct comedi_insn, getting the length from the n_insns member of the struct comedi_insnlist supplied by the user. The allocation will fail with a WARNING and a stack dump if it is too large.

Avoid that by failing with an -EINVAL error if the supplied n_insns value is unreasonable.

Define the limit on the n_insns value in the MAX_INSNS macro. Set this to the same value as MAX_SAMPLES (65536), which is the maximum allowed sum of the values of the member n in the array of struct comedi_insn, and sensible comedi instructions will have an n of at least 1.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38481.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ed9eccbe8970f6eedc1b978c157caf1251a896d4
Fixed
454d732dfd0aef7d7aa950c409215ca06d717e93
Fixed
c68257588e87f45530235701a42496b7e9e56adb
Fixed
69dc06b9514522de532e997a21d035cd29b0db44
Fixed
d4c73ce13f5b5a0fe0319f1f352ff602f0ace8e3
Fixed
c9d3d9667443caafa804cd07940aeaef8e53aa90
Fixed
992d600f284e719242a434166e86c1999649b71c
Fixed
e3b8322cc8081d142ee4c1a43e1d702bdba1ed76
Fixed
08ae4b20f5e82101d77326ecab9089e110f224cc

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38481.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.29
Fixed
5.4.297
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.241
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.190
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.147
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.100
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.40
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38481.json"