Impact
The Linux kernel’s COMEDI subsystem contains a flaw in the ni_atmio16d driver’s detach routine. When the attach handler fails, the kernel will unconditionally call reset_atmio16d() to clean up, but the private data structure may not yet be valid and the I/O base address may still be zero. This can cause the driver to write to an unintended I/O port or dereference a null pointer, resulting in memory corruption or a kernel crash. The description indicates a local denial‑of‑service condition rather than remote code execution, as the flaw resides in kernel cleanup performed during device attachment.
Affected Systems
The issue is present in all Linux kernel builds that include the COMEDI ni_atmio16d driver. Any system that loads this module—either through built‑in configuration or as a module—may experience the unchecked cleanup path. Because no specific kernel version is listed, all releases prior to the upstream fix are potentially affected until the kernel is updated with the commit that introduces a NULL check.
Risk and Exploitability
The advisory does not provide CVSS or EPSS scores, but a null‑pointer dereference during kernel teardown can lead to a denial of service or, in rare cases, memory corruption. There is no listing in CISA’s KEV catalog and no known public exploits at the time of writing. Exploitation likely requires local or privileged access to provoke the failed attach sequence, for example by loading a malformed device driver or supplying invalid parameters that cause the attach to return an error. No remote attack vector is described in the CVE data.
OpenCVE Enrichment
Debian DLA
Debian DSA