CVE-2025-38478 Affecting kernel-rt-64k-modules-extra package, versions *


Severity

Recommended
0.0
medium
0
10

Based on CentOS security rating.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS9-KERNELRT64KMODULESEXTRA-11182734
  • published29 Jul 2025
  • disclosed28 Jul 2025

Introduced: 28 Jul 2025

NewCVE-2025-38478  (opens in a new tab)

How to fix?

There is no fixed version for Centos:9 kernel-rt-64k-modules-extra.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-rt-64k-modules-extra package and not the kernel-rt-64k-modules-extra package as distributed by Centos. See How to fix? for Centos:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

comedi: Fix initialization of data for instructions that write to subdevice

Some Comedi subdevice instruction handlers are known to access instruction data elements beyond the first insn->n elements in some cases. The do_insn_ioctl() and do_insnlist_ioctl() functions allocate at least MIN_SAMPLES (16) data elements to deal with this, but they do not initialize all of that. For Comedi instruction codes that write to the subdevice, the first insn->n data elements are copied from user-space, but the remaining elements are left uninitialized. That could be a problem if the subdevice instruction handler reads the uninitialized data. Ensure that the first MIN_SAMPLES elements are initialized before calling these instruction handlers, filling the uncopied elements with 0. For do_insnlist_ioctl(), the same data buffer elements are used for handling a list of instructions, so ensure the first MIN_SAMPLES elements are initialized for each instruction that writes to the subdevice.

CVSS Base Scores

version 3.1