Impact
In Linux kernels that include the COMEDI subsystem, the spinlock in struct comedi_device is normally initialized by COMEDI and then used by any low‑level driver attached to that device. The patch that reinitializes dev->spinlock before each attachment was added to correct a situation where a COMEDI device can be reattached to multiple low‑level drivers during its lifetime. The existing code could leave the spinlock in an inconsistent state if the new driver uses a different locking level, potentially causing race conditions or other undefined behavior. This weakness is classified as CWE‑909 (Improper Use Of Spin‑Lock).
Affected Systems
All Linux distributions that ship kernel versions built without the commit that performs the reinitialization are affected. This includes any kernel that contains the COMEDI subsystem and has the legacy minor parameter enabled, allowing a COMEDI device to be reattached via the COMEDI_DEVCONFIG ioctl. Versions prior to the fix in commit 2b1f49e4 are vulnerable; exact kernel release boundaries are not specified in the CVE record.
Risk and Exploitability
The CVSS and EPSS scores are not available, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that privileged access is required to invoke the COMEDI_DEVCONFIG ioctl, which is usually restricted to users with root or equivalent capabilities. The potential impact is limited to kernel instability or denial of service in the affected context, but no publicly reported exploits exist. The risk is therefore considered moderate, focusing on a local and privileged attack vector.
OpenCVE Enrichment