Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Linux Kernel: Virtuser GPIO Configuration Can Cause System Crash

CVE-2026-23158
Summary

A bug in the Linux kernel's virtuser GPIO configuration feature can cause a system crash. This issue affects Linux systems that use this feature, which is used to manage virtual GPIO devices. To fix this issue, ensure you have the latest Linux kernel updates installed to prevent potential system crashes.

Original title
In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in configfs release path The gpio-virtuser configfs release path uses guard(mutex) to protect the devic...
Original description
In the Linux kernel, the following vulnerability has been resolved:

gpio: virtuser: fix UAF in configfs release path

The gpio-virtuser configfs release path uses guard(mutex) to protect
the device structure. However, the device is freed before the guard
cleanup runs, causing mutex_unlock() to operate on freed memory.

Specifically, gpio_virtuser_device_config_group_release() destroys
the mutex and frees the device while still inside the guard(mutex)
scope. When the function returns, the guard cleanup invokes
mutex_unlock(&dev->lock), resulting in a slab use-after-free.

Limit the mutex lifetime by using a scoped_guard() only around the
activation check, so that the lock is released before mutex_destroy()
and kfree() are called.
Published: 14 Feb 2026 · Updated: 10 Mar 2026 · First seen: 6 Mar 2026