comedi: ni_atmio16d: Fix invalid clean-up after failed attach
Summary
| CVE | CVE-2026-31749 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-01 15:16:37 UTC |
| Updated | 2026-05-01 15:24:14 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
comedi: ni_atmio16d: Fix invalid clean-up after failed attach
If the driver's COMEDI "attach" handler function (`atmio16d_attach()`)
returns an error, the COMEDI core will call the driver's "detach"
handler function (`atmio16d_detach()`) to clean up. This calls
`reset_atmio16d()` unconditionally, but depending on where the error
occurred in the attach handler, the device may not have been
sufficiently initialized to call `reset_atmio16d()`. It uses
`dev->iobase` as the I/O port base address and `dev->private` as the
pointer to the COMEDI device's private data structure. `dev->iobase`
may still be set to its initial value of 0, which would result in
undesired writes to low I/O port addresses. `dev->private` may still be
`NULL`, which would result in null pointer dereferences.
Fix `atmio16d_detach()` by checking that `dev->private` is valid
(non-null) before calling `reset_atmio16d()`. This implies that
`dev->iobase` was set correctly since that is set up before
`dev->private`. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 2323b276308a5da5774b778f39c7fd94b2a3022a a01dd339ea6ac58b0967a50085622a6017351140 git |
Not specified |
| CNA |
Linux |
Linux |
affected 2323b276308a5da5774b778f39c7fd94b2a3022a 933a2d6a95f9bfb203e562c9be1dd990c735535c git |
Not specified |
| CNA |
Linux |
Linux |
affected 2323b276308a5da5774b778f39c7fd94b2a3022a 5d8d88c8c0eec230de8f1f60e0920a4337939a88 git |
Not specified |
| CNA |
Linux |
Linux |
affected 2323b276308a5da5774b778f39c7fd94b2a3022a f517646e008fe99ca1800601cd011b110f8684ae git |
Not specified |
| CNA |
Linux |
Linux |
affected 2323b276308a5da5774b778f39c7fd94b2a3022a 3848ae00b1642e2c98ff8cbfd2d3b38c6f53b5c3 git |
Not specified |
| CNA |
Linux |
Linux |
affected 2323b276308a5da5774b778f39c7fd94b2a3022a 43c68a2c7cc35b7c2a83c285cb4ad3d472b8caa2 git |
Not specified |
| CNA |
Linux |
Linux |
affected 2323b276308a5da5774b778f39c7fd94b2a3022a d07d97ca4f7fac467cdcf4a012690853958b7e89 git |
Not specified |
| CNA |
Linux |
Linux |
affected 2323b276308a5da5774b778f39c7fd94b2a3022a 101ab946b79ad83b36d5cfd47de587492a80acf0 git |
Not specified |
| CNA |
Linux |
Linux |
affected 2.6.30 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 2.6.30 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.10.253 5.10.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.15.203 5.15.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.168 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.134 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.81 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.22 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.12 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/f517646e008fe99ca1800601cd011b110f8684ae |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/3848ae00b1642e2c98ff8cbfd2d3b38c6f53b5c3 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/101ab946b79ad83b36d5cfd47de587492a80acf0 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/d07d97ca4f7fac467cdcf4a012690853958b7e89 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/933a2d6a95f9bfb203e562c9be1dd990c735535c |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/a01dd339ea6ac58b0967a50085622a6017351140 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/5d8d88c8c0eec230de8f1f60e0920a4337939a88 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/43c68a2c7cc35b7c2a83c285cb4ad3d472b8caa2 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.