CVE-2025-38687

Source
https://cve.org/CVERecord?id=CVE-2025-38687
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38687.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38687
Downstream
Related
Published
2025-09-04T15:32:41.702Z
Modified
2026-03-20T12:42:59.338264Z
Summary
comedi: fix race between polling and detaching
Details

In the Linux kernel, the following vulnerability has been resolved:

comedi: fix race between polling and detaching

syzbot reports a use-after-free in comedi in the below link, which is due to comedi gladly removing the allocated async area even though poll requests are still active on the waitqueuehead inside of it. This can cause a use-after-free when the poll entries are later triggered or removed, as the memory for the waitqueuehead has been freed. We need to check there are no tasks queued on any of the subdevices' wait queues before allowing the device to be detached by the COMEDI_DEVCONFIG ioctl.

Tasks will read-lock dev->attach_lock before adding themselves to the subdevice wait queue, so fix the problem in the COMEDI_DEVCONFIG ioctl handler by write-locking dev->attach_lock before checking that all of the subdevices are safe to be deleted. This includes testing for any sleepers on the subdevices' wait queues. It remains locked until the device has been detached. This requires the comedi_device_detach() function to be refactored slightly, moving the bulk of it into new function comedi_device_detach_locked().

Note that the refactor of comedi_device_detach() results in comedi_device_cancel_all() now being called while dev->attach_lock is write-locked, which wasn't the case previously, but that does not matter.

Thanks to Jens Axboe for diagnosing the problem and co-developing this patch.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38687.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1
Fixed
fe67122ba781df44a1a9716eb1dfd751321ab512
Fixed
cd4286123d6948ff638ea9cd5818ae4796d5d252
Fixed
d85fac8729c9acfd72368faff1d576ec585e5c8f
Fixed
0f989f9d05492028afd2bded4b42023c57d8a76e
Fixed
5c4a2ffcbd052c69bbf4680677d4c4eaa5a252d4
Fixed
017198079551a2a5cf61eae966af3c4b145e1f3b
Fixed
71ca60d2e631cf9c63bcbc7017961c61ff04e419
Fixed
5724e82df4f9a4be62908362c97d522d25de75dd
Fixed
35b6fc51c666fc96355be5cd633ed0fe4ccf68b2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38687.json"