CVE-2026-23158

Source
https://cve.org/CVERecord?id=CVE-2026-23158
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23158.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23158
Downstream
Related
Published
2026-02-14T16:01:24.568Z
Modified
2026-04-02T17:30:48.719352373Z
Summary
gpio: virtuser: fix UAF in configfs release path
Details

In the Linux kernel, the following vulnerability has been resolved:

gpio: virtuser: fix UAF in configfs release path

The gpio-virtuser configfs release path uses guard(mutex) to protect the device structure. However, the device is freed before the guard cleanup runs, causing mutex_unlock() to operate on freed memory.

Specifically, gpiovirtuserdeviceconfiggrouprelease() destroys the mutex and frees the device while still inside the guard(mutex) scope. When the function returns, the guard cleanup invokes mutexunlock(&dev->lock), resulting in a slab use-after-free.

Limit the mutex lifetime by using a scopedguard() only around the activation check, so that the lock is released before mutexdestroy() and kfree() are called.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23158.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
91581c4b3f29e2e22aeb1a62e842d529ca638b2d
Fixed
815a8e3bf72811d402b30bd4a53cde5e9df7a563
Fixed
7bec90f605cfb138006f5ba575f2310593347110
Fixed
53ad4a948a4586359b841d607c08fb16c5503230

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23158.json"