CVE-2026-23158 PUBLISHED CVSS 7.800000190734863 HIGH

In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in configfs release path The gpio-virtuser configfs release path uses guard(mutex) to protect the device structure. However, the device is freed before the guard cleanup runs, causing mutex_unlock() to operate on freed memory. Specifically, gpio_virtuser_device_config_group_release() destroys the mutex and frees the device while still inside the guard(mutex) scope. When the function returns, the guard cleanup invokes mutex_unlock(&dev->lock), resulting in a slab use-after-free. Limit the mutex lifetime by using a scoped_guard() only around the activation check, so that the lock is released before mutex_destroy() and kfree() are called.

EPSS 0.02% · 3.1th percentile

Risk Scores

CVSS v3.1
7.800000190734863
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score
0.02%
3.1th percentile

Affected Products

VendorProductVersions
LinuxLinux91581c4b3f29e2e22aeb1a62e842d529ca638b2d, 91581c4b3f29e2e22aeb1a62e842d529ca638b2d, 91581c4b3f29e2e22aeb1a62e842d529ca638b2d
linuxlinux_kernel6.11, 6.11, 6.11

Timeline

References

Open in Interactive Console →