VYPR
High severity7.1NVD Advisory· Published Sep 5, 2025· Updated May 12, 2026

CVE-2025-39685

CVE-2025-39685

Description

In the Linux kernel, the following vulnerability has been resolved:

comedi: pcl726: Prevent invalid irq number

The reproducer passed in an irq number(0x80008000) that was too large, which triggered the oob.

Added an interrupt number check to prevent users from passing in an irq number that was too large.

If it->options[1] is 31, then 1 << it->options[1] is still invalid because it shifts a 1-bit into the sign bit (which is UB in C). Possible solutions include reducing the upper bound on the it->options[1] value to 30 or lower, or using 1U << it->options[1].

The old code would just not attempt to request the IRQ if the options[1] value were invalid. And it would still configure the device without interrupts even if the call to request_irq returned an error. So it would be better to combine this test with the test below.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2025-39685: Linux kernel comedi pcl726 driver misses irq number validation, leading to out-of-bounds access from a large user-supplied irq number.

Vulnerability

Description

CVE-2025-39685 is a vulnerability in the Linux kernel's comedi subsystem, specifically in the pcl726 driver. The driver fails to validate the interrupt request (IRQ) number provided by a user via the options[1] field. A specially crafted, overly large value (e.g., 0x80008000) triggers an out-of-bounds (OOB) access. [2][3][4]

Exploitation

Prerequisites

An attacker needs local access to the system and the ability to pass a malicious IRQ number to the comedi device configuration interface. No special privileges beyond those required to interact with comedi devices are mentioned; however, the attack surface is limited to systems where the comedi pcl726 driver is loaded and accessible. [1]

Impact

Successful exploitation can lead to an out-of-bounds memory access, potentially causing system instability or a denial of service (DoS). The vulnerability does not appear to enable remote code execution; the primary impact is integrity and availability of the affected system. [1]

Mitigation

The fix introduces a check to reject invalid IRQ numbers (e.g., greater than 30) before the value is used in shift or bit operations, preventing the OOB condition. The patch has been applied to the Linux kernel stable branches. Users should update to a patched kernel version. Additionally, Siemens has listed this CVE as affecting SIMATIC CN 4100 devices before V5.0, advising an update to mitigate the risk. [1][2][3][4]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

1