CVE-2025-68332
Improper PNP Driver Unregistration in Linux Comedi c6xdigio
Publication date: 2025-12-22
Last updated on: 2025-12-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| comedi | c6xdigio | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Comedi low-level driver 'c6xdigio' in the Linux kernel. The driver improperly handles the registration and unregistration of a PNP driver. Specifically, it ignores errors when registering the PNP driver during device attachment and unconditionally unregisters the PNP driver during device detachment, even if registration failed or never occurred. This leads to warnings and potential instability because the driver unregisters a driver that was never successfully registered. The fix involves moving the PNP driver registration to module initialization and unregistration to module exit, ensuring proper lifecycle management.
How can this vulnerability impact me? :
This vulnerability can cause warnings and instability in the Linux kernel due to improper driver unregistration. Specifically, it triggers unexpected driver unregister warnings, which may lead to kernel warnings or crashes, potentially affecting system stability and reliability when using the affected Comedi 'c6xdigio' driver.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the c6xdigio driver has been fixed to register and unregister the PNP driver correctly at module init and exit time, respectively. Avoid using affected kernel versions with the vulnerable c6xdigio driver. Since the issue involves improper driver unregistration causing warnings and potential instability, applying the patch or kernel update that fixes this behavior is the recommended immediate step.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for the warning message "Unexpected driver unregister!" which is issued by driver_unregister() when the c6xdigio driver improperly unregisters the PNP driver. You can check the kernel logs using the command: `dmesg | grep 'Unexpected driver unregister!'`. Additionally, monitoring for crashes or warnings related to the c6xdigio driver in the kernel logs may help detect this issue.