Home

Description

In the Linux kernel, the following vulnerability has been resolved: reset: gpio: suppress bind attributes in sysfs This is a special device that's created dynamically and is supposed to stay in memory forever. We also currently don't have a devlink between it and the actual reset consumer. Suppress sysfs bind attributes so that user-space can't unbind the device because - as of now - it will cause a use-after-free splat from any user that puts the reset control handle.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-06 | Updated 2026-05-06 | Assigner Linux

Product status

Default status
unaffected

cee544a40e4426040946e685988b1489f13e6600 (git) before 09d6efc6abd42809956d598906c222ccd1c8ae92
affected

cee544a40e4426040946e685988b1489f13e6600 (git) before 76801c3dfca0ac6339a23e9615b5f23e25b8644c
affected

cee544a40e4426040946e685988b1489f13e6600 (git) before 1d7d869f074f98c34fe23f6a56e5f3acc1f95a2b
affected

cee544a40e4426040946e685988b1489f13e6600 (git) before 16de4c6a8fe9ff497ca1aba33ef0dbee09f11952
affected

Default status
affected

6.9
affected

Any version before 6.9
unaffected

6.12.75 (semver)
unaffected

6.18.16 (semver)
unaffected

6.19.6 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/09d6efc6abd42809956d598906c222ccd1c8ae92

git.kernel.org/...c/76801c3dfca0ac6339a23e9615b5f23e25b8644c

git.kernel.org/...c/1d7d869f074f98c34fe23f6a56e5f3acc1f95a2b

git.kernel.org/...c/16de4c6a8fe9ff497ca1aba33ef0dbee09f11952

cve.org (CVE-2026-43138)

nvd.nist.gov (CVE-2026-43138)

Download JSON