CVE-2025-68258

Source
https://cve.org/CVERecord?id=CVE-2025-68258
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68258.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68258
Downstream
Related
Published
2025-12-16T14:45:00.920Z
Modified
2026-03-20T12:46:20.098137Z
Summary
comedi: multiq3: sanitize config options in multiq3_attach()
Details

In the Linux kernel, the following vulnerability has been resolved:

comedi: multiq3: sanitize config options in multiq3_attach()

Syzbot identified an issue [1] in multiq3attach() that induces a task timeout due to open() or COMEDIDEVCONFIG ioctl operations, specifically, in the case of multiq3 driver.

This problem arose when syzkaller managed to craft weird configuration options used to specify the number of channels in encoder subdevice. If a particularly great number is passed to s->nchan in multiq3attach() via it->options[2], then multiple calls to multiq3encoderreset() at the end of driver-specific attach() method will be running for minutes, thus blocking tasks and affected devices as well.

While this issue is most likely not too dangerous for real-life devices, it still makes sense to sanitize configuration inputs. Enable a sensible limit on the number of encoder chips (4 chips max, each with 2 channels) to stop this behaviour from manifesting.

[1] Syzbot crash: INFO: task syz.2.19:6067 blocked for more than 143 seconds. ... Call Trace: <TASK> context_switch kernel/sched/core.c:5254 [inline] __schedule+0x17c4/0x4d60 kernel/sched/core.c:6862 __scheduleloop kernel/sched/core.c:6944 [inline] schedule+0x165/0x360 kernel/sched/core.c:6959 schedulepreempt_disabled+0x13/0x30 kernel/sched/core.c:7016 __mutexlockcommon kernel/locking/mutex.c:676 [inline] __mutexlock+0x7e6/0x1350 kernel/locking/mutex.c:760 comediopen+0xc0/0x590 drivers/comedi/comedifops.c:2868 chrdevopen+0x4cc/0x5e0 fs/chardev.c:414 dodentryopen+0x953/0x13f0 fs/open.c:965 vfsopen+0x3b/0x340 fs/open.c:1097 ...

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68258.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
77e01cdbad5175f56027fd6fae00bd0fc175651a
Fixed
f9ff87aac7b37d462246c46d28912d382a8e2ea6
Fixed
4cde9a7e025cc09b88097c70606f6b30c22880f4
Fixed
ad7ed3c9c7b8408e8612697bc43a5441fe386c71
Fixed
049f14557450351750f929ebfff36d849511e132
Fixed
8952bc1973cd54158c35e06bfb8c29ace7375a48
Fixed
8dc2f02d3bada9247f00bfd2e5f61f68c389a0a3
Fixed
543f4c380c2e1f35e60528df7cb54705cda7fee3
Fixed
f24c6e3a39fa355dabfb684c9ca82db579534e72

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68258.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.30
Fixed
5.10.248
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.198
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.160
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.120
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.62
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.12
Type
ECOSYSTEM
Events
Introduced
6.18.0
Fixed
6.18.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68258.json"