CVE-2026-43340
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
08/05/2026
Última modificación:
15/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
comedi: Reinit dev->spinlock between attachments to low-level drivers<br />
<br />
`struct comedi_device` is the main controlling structure for a COMEDI<br />
device created by the COMEDI subsystem. It contains a member `spinlock`<br />
containing a spin-lock that is initialized by the COMEDI subsystem, but<br />
is reserved for use by a low-level driver attached to the COMEDI device<br />
(at least since commit 25436dc9d84f ("Staging: comedi: remove RT<br />
code")).<br />
<br />
Some COMEDI devices (those created on initialization of the COMEDI<br />
subsystem when the "comedi.comedi_num_legacy_minors" parameter is<br />
non-zero) can be attached to different low-level drivers over their<br />
lifetime using the `COMEDI_DEVCONFIG` ioctl command. This can result in<br />
inconsistent lock states being reported when there is a mismatch in the<br />
spin-lock locking levels used by each low-level driver to which the<br />
COMEDI device has been attached. Fix it by reinitializing<br />
`dev->spinlock` before calling the low-level driver&#39;s `attach` function<br />
pointer if `CONFIG_LOCKDEP` is enabled.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.29 (incluyendo) | 5.10.253 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (incluyendo) | 5.15.203 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 6.1.168 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.6.134 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.81 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.22 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.12 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/2b1f49e4fdff3ef0f8e9158bbb5b149e06287560
- https://git.kernel.org/stable/c/3181c34b415c5464be9d34bff3e43ef63b747039
- https://git.kernel.org/stable/c/430291d8f3884f57ae0057049b0ca291453e29e1
- https://git.kernel.org/stable/c/4b9a9a6d71e3e252032f959fb3895a33acb5865c
- https://git.kernel.org/stable/c/4d5ffe524903a30e2e0da7d16841a56bec2de55c
- https://git.kernel.org/stable/c/83134a7a176ce5b4b19b6edecf4360e8d98d1a5a
- https://git.kernel.org/stable/c/b89c026227712c367950bbae055a5b31073d3b30
- https://git.kernel.org/stable/c/c01bcc67a9a692d65508ebd480405b5e77d562b7



