Impact
The vulnerability exists in the comedi driver’s firmware loader for the me_daq device. When a firmware file is requested, the loader reads a 4‑byte length from the first four bytes of the file and copies that many bytes starting at offset 16, assuming the file contains that amount of data. Because the loader only checks that the firmware is at least 16 bytes long, it can copy beyond the end of the buffer if the declared length exceeds the remaining bytes in the file. This omission can overwrite adjacent kernel memory, leading to memory corruption that could cause a kernel crash or instability. The weakness corresponds to a buffer overrun (CWE‑1284).
Affected Systems
All Linux kernel installations that include the comedi me_daq driver and have not incorporated the patch are affected. No specific version range is provided, but any kernel that still contains the unguarded firmware loader code is vulnerable. Users who load firmware through the me_daq device are at risk.
Risk and Exploitability
The EPSS score is not available and the vulnerability is not listed in CISA’s KEV catalog, indicating no known widespread exploitation. Exploitation requires access to the affected hardware and the ability to trigger a firmware load, implying a local or device‑based attack vector. In the absence of a public exploit, the risk is moderate to high for environments that use the me_daq driver and could experience kernel instability from the memory corruption. The CVSS score is not supplied in the data, but a kernel buffer overrun typically warrants a high severity rating.
OpenCVE Enrichment
Debian DLA
Debian DSA