{"id":"CVE-2025-38483","summary":"comedi: das16m1: Fix bit shift out of bounds","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: das16m1: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\t/* only irqs 2, 3, 4, 5, 6, 7, 10, 11, 12, 14, and 15 are valid */\n\tif ((1 \u003c\u003c it-\u003eoptions[1]) & 0xdcfc) {\n\nHowever, `it-\u003eoptions[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it-\u003eoptions[1]` to be within bounds before proceeding with\nthe original test.","modified":"2026-04-16T04:35:03.413480830Z","published":"2025-07-28T11:21:47.895Z","related":["SUSE-SU-2025:02853-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:02969-1","SUSE-SU-2025:02996-1","SUSE-SU-2025:02997-1","SUSE-SU-2025:03011-1","SUSE-SU-2025:03023-1","SUSE-SU-2025:20577-1","SUSE-SU-2025:20586-1","SUSE-SU-2025:20601-1","SUSE-SU-2025:20602-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38483.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/076b13ee60eb01ed0d140ef261f95534562a3077"},{"type":"WEB","url":"https://git.kernel.org/stable/c/539bdff832adac9ea653859fa0b6bc62e743329c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/65c03e6fc524eb2868abedffd8a4613d78abc288"},{"type":"WEB","url":"https://git.kernel.org/stable/c/adb7df8a8f9d788423e161b779764527dd3ec2d0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b3c95fa508e5dc3da60520eea92a5241095ceef1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d1291c69f46d6572b2cf75960dd8975d7ab2176b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ed93c6f68a3be06e4e0c331c6e751f462dee3932"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f211572818ed5bec2b3f5d4e0719ef8699b3c269"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38483.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38483"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"729988507680b2ce934bce61d9ce0ea7b235914c"},{"fixed":"539bdff832adac9ea653859fa0b6bc62e743329c"},{"fixed":"d1291c69f46d6572b2cf75960dd8975d7ab2176b"},{"fixed":"b3c95fa508e5dc3da60520eea92a5241095ceef1"},{"fixed":"65c03e6fc524eb2868abedffd8a4613d78abc288"},{"fixed":"adb7df8a8f9d788423e161b779764527dd3ec2d0"},{"fixed":"076b13ee60eb01ed0d140ef261f95534562a3077"},{"fixed":"f211572818ed5bec2b3f5d4e0719ef8699b3c269"},{"fixed":"ed93c6f68a3be06e4e0c331c6e751f462dee3932"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38483.json"}}],"schema_version":"1.7.5"}