CVE-2025-38530

Source
https://cve.org/CVERecord?id=CVE-2025-38530
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38530.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38530
Downstream
Related
Published
2025-08-16T11:12:23.368Z
Modified
2026-03-12T02:19:25.578390Z
Summary
comedi: pcl812: Fix bit shift out of bounds
Details

In the Linux kernel, the following vulnerability has been resolved:

comedi: pcl812: Fix bit shift out of bounds

When checking for a supported IRQ number, the following test is used:

if ((1 << it->options[1]) & board->irq_bits) {

However, it->options[i] is an unchecked int value from userspace, so the shift amount could be negative or out of bounds. Fix the test by requiring it->options[1] to be within bounds before proceeding with the original test. Valid it->options[1] values that select the IRQ will be in the range [1,15]. The value 0 explicitly disables the use of interrupts.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38530.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fcdb427bc7cf5e9e5d7280cf09c08dec49b49432
Fixed
374d9b3eb4b08407997ef1fce96119d31e0c0bc4
Fixed
0489c30d080f07cc7f09d04de723d8c2ccdb61ef
Fixed
29ef03e5b84431171d6b77b822985b54bc44b793
Fixed
5bfa301e1e59a9b1a7b62a800b54852337c97416
Fixed
7e470d8efd10725b189ca8951973a8425932398a
Fixed
a27e27eee313fe1c450b6af1e80e64412546cab4
Fixed
16c173abee315953fd17a279352fec4a1faee862
Fixed
b14b076ce593f72585412fc7fd3747e03a5e3632

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38530.json"