Description
In the Linux kernel, the following vulnerability has been resolved:

comedi: runflags cannot determine whether to reclaim chanlist

syzbot reported a memory leak [1], because commit 4e1da516debb ("comedi:
Add reference counting for Comedi command handling") did not consider
the exceptional exit case in do_cmd_ioctl() where runflags is not set.
This caused chanlist not to be properly freed by do_become_nonbusy(),
as it only frees chanlist when runflags is correctly set.

Added a check in do_become_nonbusy() for the case where runflags is not
set, to properly free the chanlist memory.

[1]
BUG: memory leak
backtrace (crc 844a0efa):
__comedi_get_user_chanlist drivers/comedi/comedi_fops.c:1815 [inline]
do_cmd_ioctl.part.0+0x112/0x350 drivers/comedi/comedi_fops.c:1890
do_cmd_ioctl drivers/comedi/comedi_fops.c:1858 [inline]
Published: 2026-05-01
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel’s comedi driver, the runflags flag is insufficiently inspected during an exceptional exit of do_cmd_ioctl(). When runflags is not set, do_become_nonbusy() fails to release the chanlist memory, causing a memory leak. This flaw is a CWE-911 weakness. Repeated invocations of the problematic ioctl path will continually exhaust kernel memory, potentially degrading performance or causing the system to become unresponsive.

Affected Systems

All Linux kernel releases that ship with the comedi driver but do not include commit 4e1da516debb. Distributions that have not applied this reference‑counting patch are affected.

Risk and Exploitability

The likeliest attack vector is a local attacker who can access the comedi device to repeatedly trigger the ioctl interface. Because the flaw is a memory leak rather than an elevation of privilege or remote code execution, broad exploitation is unlikely in generic scenarios, yet environments with trusted users or automated scripts can accelerate memory exhaustion and provoke a denial‑of‑service event. EPSS data is not available and the issue is not listed in CISA KEV, but the absence of a publicly known exploit does not reduce the potential impact of sustained leaking.

Generated by OpenCVE AI on May 2, 2026 at 12:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the kernel to a version that contains commit 4e1da516debb, which adds proper runflags handling and chanlist cleanup.
  • If an upgrade cannot be performed immediately, blacklist or unload the comedi kernel module, or restrict access to the comedi device so that only trusted users may issue ioctl calls.
  • After applying the fix or disabling the module, monitor /proc/meminfo and kernel logs for abnormal memory consumption to verify that the leak has ceased.

Generated by OpenCVE AI on May 2, 2026 at 12:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 00:15:00 +0000


Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: comedi: runflags cannot determine whether to reclaim chanlist syzbot reported a memory leak [1], because commit 4e1da516debb ("comedi: Add reference counting for Comedi command handling") did not consider the exceptional exit case in do_cmd_ioctl() where runflags is not set. This caused chanlist not to be properly freed by do_become_nonbusy(), as it only frees chanlist when runflags is correctly set. Added a check in do_become_nonbusy() for the case where runflags is not set, to properly free the chanlist memory. [1] BUG: memory leak backtrace (crc 844a0efa): __comedi_get_user_chanlist drivers/comedi/comedi_fops.c:1815 [inline] do_cmd_ioctl.part.0+0x112/0x350 drivers/comedi/comedi_fops.c:1890 do_cmd_ioctl drivers/comedi/comedi_fops.c:1858 [inline]
Title comedi: runflags cannot determine whether to reclaim chanlist
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:14:42.887Z

Reserved: 2026-03-09T15:48:24.139Z

Link: CVE-2026-31750

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:37.850

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-31750

cve-icon Redhat

Severity :

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-31750 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T12:15:25Z

Weaknesses