In the Linux kernel, the following vulnerability has been...
High severity
Unreviewed
Published
Sep 5, 2025
to the GitHub Advisory Database
•
Updated Jan 8, 2026
Description
Published by the National Vulnerability Database
Sep 5, 2025
Published to the GitHub Advisory Database
Sep 5, 2025
Last updated
Jan 8, 2026
In the Linux kernel, the following vulnerability has been resolved:
comedi: pcl726: Prevent invalid irq number
The reproducer passed in an irq number(0x80008000) that was too large,
which triggered the oob.
Added an interrupt number check to prevent users from passing in an irq
number that was too large.
If
it->options[1]is 31, then1 << it->options[1]is still invalidbecause it shifts a 1-bit into the sign bit (which is UB in C).
Possible solutions include reducing the upper bound on the
it->options[1]value to 30 or lower, or using1U << it->options[1].The old code would just not attempt to request the IRQ if the
options[1]value were invalid. And it would still configure thedevice without interrupts even if the call to
request_irqreturned anerror. So it would be better to combine this test with the test below.
References