Home

Description

In the Linux kernel, the following vulnerability has been resolved: gpib: fix use-after-free in IO ioctl handlers The IBRD, IBWRT, IBCMD, and IBWAIT ioctl handlers use a gpib_descriptor pointer after board->big_gpib_mutex has been released. A concurrent IBCLOSEDEV ioctl can free the descriptor via close_dev_ioctl() during this window, causing a use-after-free. The IO handlers (read_ioctl, write_ioctl, command_ioctl) explicitly release big_gpib_mutex before calling their handler. wait_ioctl() is called with big_gpib_mutex held, but ibwait() releases it internally when wait_mask is non-zero. In all four cases, the descriptor pointer obtained from handle_to_descriptor() becomes unprotected. Fix this by introducing a kernel-only descriptor_busy reference count in struct gpib_descriptor. Each handler atomically increments descriptor_busy under file_priv->descriptors_mutex before releasing the lock, and decrements it when done. close_dev_ioctl() checks descriptor_busy under the same lock and rejects the close with -EBUSY if the count is non-zero. A reference count rather than a simple flag is necessary because multiple handlers can operate on the same descriptor concurrently (e.g. IBRD and IBWAIT on the same handle from different threads). A separate counter is needed because io_in_progress can be cleared from unprivileged userspace via the IBWAIT ioctl (through general_ibstatus() with set_mask containing CMPL), which would allow an attacker to bypass a check based solely on io_in_progress. The new descriptor_busy counter is only modified by the kernel IO paths. The lock ordering is consistent (big_gpib_mutex -> descriptors_mutex) and the handlers only hold descriptors_mutex briefly during the lookup, so there is no deadlock risk and no impact on IO throughput.

PUBLISHED Reserved 2026-03-09 | Published 2026-05-01 | Updated 2026-05-03 | Assigner Linux




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

9dde4559e93955ccc47d588f7fd051684d55c4e7 (git) before cae26eff1b56d78bed7873cf3e60a2b1bdd4da6c
affected

9dde4559e93955ccc47d588f7fd051684d55c4e7 (git) before 28c75dd143ead62e0dfac564c79d251e21d5d74b
affected

9dde4559e93955ccc47d588f7fd051684d55c4e7 (git) before d1857f8296dceb75d00ab857fc3c61bc00c7f5c6
affected

Default status
affected

6.13
affected

Any version before 6.13
unaffected

6.18.22 (semver)
unaffected

6.19.12 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/cae26eff1b56d78bed7873cf3e60a2b1bdd4da6c

git.kernel.org/...c/28c75dd143ead62e0dfac564c79d251e21d5d74b

git.kernel.org/...c/d1857f8296dceb75d00ab857fc3c61bc00c7f5c6

cve.org (CVE-2026-31769)

nvd.nist.gov (CVE-2026-31769)

Download JSON