CVE-2025-68257

Source
https://cve.org/CVERecord?id=CVE-2025-68257
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68257.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68257
Downstream
Related
Published
2025-12-16T14:44:59.535Z
Modified
2026-03-20T12:46:19.855444Z
Summary
comedi: check device's attached status in compat ioctls
Details

In the Linux kernel, the following vulnerability has been resolved:

comedi: check device's attached status in compat ioctls

Syzbot identified an issue [1] that crashes kernel, seemingly due to unexistent callback dev->getvalidroutes(). By all means, this should not occur as said callback must always be set to getzerovalid_routes() in __comedidevicepostconfig().

As the crash seems to appear exclusively in i386 kernels, at least, judging from [1] reports, the blame lies with compat versions of standard IOCTL handlers. Several of them are modified and do not use comediunlockedioctl(). While functionality of these ioctls essentially copy their original versions, they do not have required sanity check for device's attached status. This, in turn, leads to a possibility of calling select IOCTLs on a device that has not been properly setup, even via COMEDI_DEVCONFIG.

Doing so on unconfigured devices means that several crucial steps are missed, for instance, specifying dev->getvalidroutes() callback.

Fix this somewhat crudely by ensuring device's attached status before performing any ioctls, improving logic consistency between modern and compat functions.

[1] Syzbot report: BUG: kernel NULL pointer dereference, address: 0000000000000000 ... CR2: ffffffffffffffd6 CR3: 000000006c717000 CR4: 0000000000352ef0 Call Trace: <TASK> getvalidroutes drivers/comedi/comedifops.c:1322 [inline] parseinsn+0x78c/0x1970 drivers/comedi/comedifops.c:1401 doinsnlistioctl+0x272/0x700 drivers/comedi/comedifops.c:1594 compatinsnlist drivers/comedi/comedifops.c:3208 [inline] comedicompatioctl+0x810/0x990 drivers/comedi/comedi_fops.c:3273 __docompatsys_ioctl fs/ioctl.c:695 [inline] __secompatsys_ioctl fs/ioctl.c:638 [inline] __ia32compatsysioctl+0x242/0x370 fs/ioctl.c:638 dosyscall32irqson arch/x86/entry/syscall32.c:83 [inline] ...

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68257.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3fbfd2223a271426509830e6340c386a1054cfad
Fixed
4836ba483a22ebd076c8faaf8293a7295fad4142
Fixed
7141915bf0c41cb57d83cdbaf695b8c731b16b71
Fixed
f13895c03620933a58907e3250016f087e39b78c
Fixed
b975f91de5f8f63cf490f0393775cc795f8b0557
Fixed
f6e629dfe6f590091c662a87c9fcf118b1c1c7dc
Fixed
573b07d2e3d473ee7eb625ef87519922cf01168d
Fixed
aac80e912de306815297a3b74f0426873ffa7dc3
Fixed
0de7d9cd07a2671fa6089173bccc0b2afe6b93ee

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68257.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.8.0
Fixed
5.10.248
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.198
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.160
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.120
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.62
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.12
Type
ECOSYSTEM
Events
Introduced
6.18.0
Fixed
6.18.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68257.json"