CVE-2026-31749
Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-476
Desreferencia a puntero nulo (NULL)
Fecha de publicación:
01/05/2026
Última modificación:
07/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
comedi: ni_atmio16d: Fix invalid clean-up after failed attach<br />
<br />
If the driver&#39;s COMEDI "attach" handler function (`atmio16d_attach()`)<br />
returns an error, the COMEDI core will call the driver&#39;s "detach"<br />
handler function (`atmio16d_detach()`) to clean up. This calls<br />
`reset_atmio16d()` unconditionally, but depending on where the error<br />
occurred in the attach handler, the device may not have been<br />
sufficiently initialized to call `reset_atmio16d()`. It uses<br />
`dev->iobase` as the I/O port base address and `dev->private` as the<br />
pointer to the COMEDI device&#39;s private data structure. `dev->iobase`<br />
may still be set to its initial value of 0, which would result in<br />
undesired writes to low I/O port addresses. `dev->private` may still be<br />
`NULL`, which would result in null pointer dereferences.<br />
<br />
Fix `atmio16d_detach()` by checking that `dev->private` is valid<br />
(non-null) before calling `reset_atmio16d()`. This implies that<br />
`dev->iobase` was set correctly since that is set up before<br />
`dev->private`.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.30 (incluyendo) | 5.10.253 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (incluyendo) | 5.15.203 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 6.1.168 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.6.134 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.81 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.22 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.12 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/101ab946b79ad83b36d5cfd47de587492a80acf0
- https://git.kernel.org/stable/c/3848ae00b1642e2c98ff8cbfd2d3b38c6f53b5c3
- https://git.kernel.org/stable/c/43c68a2c7cc35b7c2a83c285cb4ad3d472b8caa2
- https://git.kernel.org/stable/c/5d8d88c8c0eec230de8f1f60e0920a4337939a88
- https://git.kernel.org/stable/c/933a2d6a95f9bfb203e562c9be1dd990c735535c
- https://git.kernel.org/stable/c/a01dd339ea6ac58b0967a50085622a6017351140
- https://git.kernel.org/stable/c/d07d97ca4f7fac467cdcf4a012690853958b7e89
- https://git.kernel.org/stable/c/f517646e008fe99ca1800601cd011b110f8684ae



