Home

Description

In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in configfs release path The gpio-virtuser configfs release path uses guard(mutex) to protect the device structure. However, the device is freed before the guard cleanup runs, causing mutex_unlock() to operate on freed memory. Specifically, gpio_virtuser_device_config_group_release() destroys the mutex and frees the device while still inside the guard(mutex) scope. When the function returns, the guard cleanup invokes mutex_unlock(&dev->lock), resulting in a slab use-after-free. Limit the mutex lifetime by using a scoped_guard() only around the activation check, so that the lock is released before mutex_destroy() and kfree() are called.

PUBLISHED Reserved 2026-01-13 | Published 2026-02-14 | Updated 2026-02-14 | Assigner Linux

Product status

Default status
unaffected

91581c4b3f29e2e22aeb1a62e842d529ca638b2d (git) before 815a8e3bf72811d402b30bd4a53cde5e9df7a563
affected

91581c4b3f29e2e22aeb1a62e842d529ca638b2d (git) before 7bec90f605cfb138006f5ba575f2310593347110
affected

91581c4b3f29e2e22aeb1a62e842d529ca638b2d (git) before 53ad4a948a4586359b841d607c08fb16c5503230
affected

Default status
affected

6.11
affected

Any version before 6.11
unaffected

6.12.69 (semver)
unaffected

6.18.9 (semver)
unaffected

6.19 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/815a8e3bf72811d402b30bd4a53cde5e9df7a563

git.kernel.org/...c/7bec90f605cfb138006f5ba575f2310593347110

git.kernel.org/...c/53ad4a948a4586359b841d607c08fb16c5503230

cve.org (CVE-2026-23158)

nvd.nist.gov (CVE-2026-23158)

Download JSON