comedi: Reinit dev->spinlock between attachments to low-level drivers
Summary
| CVE | CVE-2026-43340 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-08 14:16:43 UTC |
| Updated | 2026-05-12 14:10:27 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: comedi: Reinit dev->spinlock between attachments to low-level drivers `struct comedi_device` is the main controlling structure for a COMEDI device created by the COMEDI subsystem. It contains a member `spinlock` containing a spin-lock that is initialized by the COMEDI subsystem, but is reserved for use by a low-level driver attached to the COMEDI device (at least since commit 25436dc9d84f ("Staging: comedi: remove RT code")). Some COMEDI devices (those created on initialization of the COMEDI subsystem when the "comedi.comedi_num_legacy_minors" parameter is non-zero) can be attached to different low-level drivers over their lifetime using the `COMEDI_DEVCONFIG` ioctl command. This can result in inconsistent lock states being reported when there is a mismatch in the spin-lock locking levels used by each low-level driver to which the COMEDI device has been attached. Fix it by reinitializing `dev->spinlock` before calling the low-level driver's `attach` function pointer if `CONFIG_LOCKDEP` is enabled. |
Risk And Classification
EPSS: 0.000240000 probability, percentile 0.070360000 (date 2026-05-12)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected ed9eccbe8970f6eedc1b978c157caf1251a896d4 3181c34b415c5464be9d34bff3e43ef63b747039 git | Not specified |
| CNA | Linux | Linux | affected ed9eccbe8970f6eedc1b978c157caf1251a896d4 2b1f49e4fdff3ef0f8e9158bbb5b149e06287560 git | Not specified |
| CNA | Linux | Linux | affected ed9eccbe8970f6eedc1b978c157caf1251a896d4 4d5ffe524903a30e2e0da7d16841a56bec2de55c git | Not specified |
| CNA | Linux | Linux | affected ed9eccbe8970f6eedc1b978c157caf1251a896d4 c01bcc67a9a692d65508ebd480405b5e77d562b7 git | Not specified |
| CNA | Linux | Linux | affected ed9eccbe8970f6eedc1b978c157caf1251a896d4 430291d8f3884f57ae0057049b0ca291453e29e1 git | Not specified |
| CNA | Linux | Linux | affected ed9eccbe8970f6eedc1b978c157caf1251a896d4 b89c026227712c367950bbae055a5b31073d3b30 git | Not specified |
| CNA | Linux | Linux | affected ed9eccbe8970f6eedc1b978c157caf1251a896d4 83134a7a176ce5b4b19b6edecf4360e8d98d1a5a git | Not specified |
| CNA | Linux | Linux | affected ed9eccbe8970f6eedc1b978c157caf1251a896d4 4b9a9a6d71e3e252032f959fb3895a33acb5865c git | Not specified |
| CNA | Linux | Linux | affected 2.6.29 | Not specified |
| CNA | Linux | Linux | unaffected 2.6.29 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.253 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.168 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.134 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.81 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.22 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.12 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/b89c026227712c367950bbae055a5b31073d3b30 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/c01bcc67a9a692d65508ebd480405b5e77d562b7 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/3181c34b415c5464be9d34bff3e43ef63b747039 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/2b1f49e4fdff3ef0f8e9158bbb5b149e06287560 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/4b9a9a6d71e3e252032f959fb3895a33acb5865c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/83134a7a176ce5b4b19b6edecf4360e8d98d1a5a | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/430291d8f3884f57ae0057049b0ca291453e29e1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/4d5ffe524903a30e2e0da7d16841a56bec2de55c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.