Impact
The dt2815 driver in the Linux kernel accepts arbitrary I/O port addresses through the COMEDI_DEVCONFIG ioctl. When it attempts to write to an address with no hardware, the outb() operation can trigger a page fault, causing a kernel panic. This defect leads to a denial of service by crashing the kernel. Based on the description, the likely attack vector is a local privileged user or a system that can invoke the ioctl; remote exploitation would require privilege escalation. A denial of service results because the kernel stops responding and typically requires a reboot.
Affected Systems
Affected systems are any Linux kernel releases that include the dt2815 Comedi driver before the hardware detection fix was merged. The CPE indicates all variants of the Linux kernel, and no specific patch levels are provided, so any kernel containing the vulnerable code is at risk. If your environment uses a stock kernel or distribution kernel that shipped before the patch, the dt2815 module remains susceptible.
Risk and Exploitability
No CVSS score is listed, and EPSS data is unavailable, but the defect has a non‑zero exploit probability for local users who can load or attach the driver. Because it causes a kernel crash, the impact is high, although the attack requires low complexity once the privileged ioctl call is possible. The vulnerability is not currently in the CISA KEV catalog, suggesting no known widespread active exploitation, but the risk remains if the driver is enabled on systems lacking hardware.
OpenCVE Enrichment
Debian DLA
Debian DSA