CVE-2025-38687 (GCVE-0-2025-38687)
Vulnerability from cvelistv5
Published
2025-09-04 15:32
Modified
2025-09-04 15:32
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: comedi: fix race between polling and detaching syzbot reports a use-after-free in comedi in the below link, which is due to comedi gladly removing the allocated async area even though poll requests are still active on the wait_queue_head inside of it. This can cause a use-after-free when the poll entries are later triggered or removed, as the memory for the wait_queue_head has been freed. We need to check there are no tasks queued on any of the subdevices' wait queues before allowing the device to be detached by the `COMEDI_DEVCONFIG` ioctl. Tasks will read-lock `dev->attach_lock` before adding themselves to the subdevice wait queue, so fix the problem in the `COMEDI_DEVCONFIG` ioctl handler by write-locking `dev->attach_lock` before checking that all of the subdevices are safe to be deleted. This includes testing for any sleepers on the subdevices' wait queues. It remains locked until the device has been detached. This requires the `comedi_device_detach()` function to be refactored slightly, moving the bulk of it into new function `comedi_device_detach_locked()`. Note that the refactor of `comedi_device_detach()` results in `comedi_device_cancel_all()` now being called while `dev->attach_lock` is write-locked, which wasn't the case previously, but that does not matter. Thanks to Jens Axboe for diagnosing the problem and co-developing this patch.
Impacted products
Vendor Product Version
Linux Linux Version: 2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1
Version: 2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1
Version: 2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1
Version: 2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1
Version: 2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1
Version: 2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1
Version: 2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1
Version: 2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1
Version: 2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1
Create a notification for this product.
   Linux Linux Version: 3.14
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/comedi/comedi_fops.c",
            "drivers/comedi/comedi_internal.h",
            "drivers/comedi/drivers.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "fe67122ba781df44a1a9716eb1dfd751321ab512",
              "status": "affected",
              "version": "2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1",
              "versionType": "git"
            },
            {
              "lessThan": "cd4286123d6948ff638ea9cd5818ae4796d5d252",
              "status": "affected",
              "version": "2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1",
              "versionType": "git"
            },
            {
              "lessThan": "d85fac8729c9acfd72368faff1d576ec585e5c8f",
              "status": "affected",
              "version": "2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1",
              "versionType": "git"
            },
            {
              "lessThan": "0f989f9d05492028afd2bded4b42023c57d8a76e",
              "status": "affected",
              "version": "2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1",
              "versionType": "git"
            },
            {
              "lessThan": "5c4a2ffcbd052c69bbf4680677d4c4eaa5a252d4",
              "status": "affected",
              "version": "2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1",
              "versionType": "git"
            },
            {
              "lessThan": "017198079551a2a5cf61eae966af3c4b145e1f3b",
              "status": "affected",
              "version": "2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1",
              "versionType": "git"
            },
            {
              "lessThan": "71ca60d2e631cf9c63bcbc7017961c61ff04e419",
              "status": "affected",
              "version": "2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1",
              "versionType": "git"
            },
            {
              "lessThan": "5724e82df4f9a4be62908362c97d522d25de75dd",
              "status": "affected",
              "version": "2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1",
              "versionType": "git"
            },
            {
              "lessThan": "35b6fc51c666fc96355be5cd633ed0fe4ccf68b2",
              "status": "affected",
              "version": "2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/comedi/comedi_fops.c",
            "drivers/comedi/comedi_internal.h",
            "drivers/comedi/drivers.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.14"
            },
            {
              "lessThan": "3.14",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.297",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.241",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.190",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.149",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.103",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.43",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.15.*",
              "status": "unaffected",
              "version": "6.15.11",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.16.*",
              "status": "unaffected",
              "version": "6.16.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.17-rc1",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.297",
                  "versionStartIncluding": "3.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.241",
                  "versionStartIncluding": "3.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.190",
                  "versionStartIncluding": "3.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.149",
                  "versionStartIncluding": "3.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.103",
                  "versionStartIncluding": "3.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.43",
                  "versionStartIncluding": "3.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15.11",
                  "versionStartIncluding": "3.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.16.2",
                  "versionStartIncluding": "3.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.17-rc1",
                  "versionStartIncluding": "3.14",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: fix race between polling and detaching\n\nsyzbot reports a use-after-free in comedi in the below link, which is\ndue to comedi gladly removing the allocated async area even though poll\nrequests are still active on the wait_queue_head inside of it. This can\ncause a use-after-free when the poll entries are later triggered or\nremoved, as the memory for the wait_queue_head has been freed.  We need\nto check there are no tasks queued on any of the subdevices\u0027 wait queues\nbefore allowing the device to be detached by the `COMEDI_DEVCONFIG`\nioctl.\n\nTasks will read-lock `dev-\u003eattach_lock` before adding themselves to the\nsubdevice wait queue, so fix the problem in the `COMEDI_DEVCONFIG` ioctl\nhandler by write-locking `dev-\u003eattach_lock` before checking that all of\nthe subdevices are safe to be deleted.  This includes testing for any\nsleepers on the subdevices\u0027 wait queues.  It remains locked until the\ndevice has been detached.  This requires the `comedi_device_detach()`\nfunction to be refactored slightly, moving the bulk of it into new\nfunction `comedi_device_detach_locked()`.\n\nNote that the refactor of `comedi_device_detach()` results in\n`comedi_device_cancel_all()` now being called while `dev-\u003eattach_lock`\nis write-locked, which wasn\u0027t the case previously, but that does not\nmatter.\n\nThanks to Jens Axboe for diagnosing the problem and co-developing this\npatch."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-04T15:32:41.702Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/fe67122ba781df44a1a9716eb1dfd751321ab512"
        },
        {
          "url": "https://git.kernel.org/stable/c/cd4286123d6948ff638ea9cd5818ae4796d5d252"
        },
        {
          "url": "https://git.kernel.org/stable/c/d85fac8729c9acfd72368faff1d576ec585e5c8f"
        },
        {
          "url": "https://git.kernel.org/stable/c/0f989f9d05492028afd2bded4b42023c57d8a76e"
        },
        {
          "url": "https://git.kernel.org/stable/c/5c4a2ffcbd052c69bbf4680677d4c4eaa5a252d4"
        },
        {
          "url": "https://git.kernel.org/stable/c/017198079551a2a5cf61eae966af3c4b145e1f3b"
        },
        {
          "url": "https://git.kernel.org/stable/c/71ca60d2e631cf9c63bcbc7017961c61ff04e419"
        },
        {
          "url": "https://git.kernel.org/stable/c/5724e82df4f9a4be62908362c97d522d25de75dd"
        },
        {
          "url": "https://git.kernel.org/stable/c/35b6fc51c666fc96355be5cd633ed0fe4ccf68b2"
        }
      ],
      "title": "comedi: fix race between polling and detaching",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-38687",
    "datePublished": "2025-09-04T15:32:41.702Z",
    "dateReserved": "2025-04-16T04:51:24.032Z",
    "dateUpdated": "2025-09-04T15:32:41.702Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-38687\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-04T16:15:36.700\",\"lastModified\":\"2025-09-05T17:47:24.833\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncomedi: fix race between polling and detaching\\n\\nsyzbot reports a use-after-free in comedi in the below link, which is\\ndue to comedi gladly removing the allocated async area even though poll\\nrequests are still active on the wait_queue_head inside of it. This can\\ncause a use-after-free when the poll entries are later triggered or\\nremoved, as the memory for the wait_queue_head has been freed.  We need\\nto check there are no tasks queued on any of the subdevices\u0027 wait queues\\nbefore allowing the device to be detached by the `COMEDI_DEVCONFIG`\\nioctl.\\n\\nTasks will read-lock `dev-\u003eattach_lock` before adding themselves to the\\nsubdevice wait queue, so fix the problem in the `COMEDI_DEVCONFIG` ioctl\\nhandler by write-locking `dev-\u003eattach_lock` before checking that all of\\nthe subdevices are safe to be deleted.  This includes testing for any\\nsleepers on the subdevices\u0027 wait queues.  It remains locked until the\\ndevice has been detached.  This requires the `comedi_device_detach()`\\nfunction to be refactored slightly, moving the bulk of it into new\\nfunction `comedi_device_detach_locked()`.\\n\\nNote that the refactor of `comedi_device_detach()` results in\\n`comedi_device_cancel_all()` now being called while `dev-\u003eattach_lock`\\nis write-locked, which wasn\u0027t the case previously, but that does not\\nmatter.\\n\\nThanks to Jens Axboe for diagnosing the problem and co-developing this\\npatch.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/017198079551a2a5cf61eae966af3c4b145e1f3b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/0f989f9d05492028afd2bded4b42023c57d8a76e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/35b6fc51c666fc96355be5cd633ed0fe4ccf68b2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5724e82df4f9a4be62908362c97d522d25de75dd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5c4a2ffcbd052c69bbf4680677d4c4eaa5a252d4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/71ca60d2e631cf9c63bcbc7017961c61ff04e419\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cd4286123d6948ff638ea9cd5818ae4796d5d252\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d85fac8729c9acfd72368faff1d576ec585e5c8f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fe67122ba781df44a1a9716eb1dfd751321ab512\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…