CVE-2026-31769
Use-After-Free in Linux Kernel GPIB Subsystem
Publication date: 2026-05-01
Last updated on: 2026-05-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free issue in the Linux kernel's gpib driver, specifically in its IO ioctl handlers (IBRD, IBWRT, IBCMD, and IBWAIT). These handlers use a pointer to a gpib_descriptor after releasing a mutex (big_gpib_mutex), which can lead to the descriptor being freed concurrently by another ioctl call (IBCLOSEDEV). This results in the handlers accessing memory that has already been freed, causing a use-after-free condition.
The problem arises because the descriptor pointer becomes unprotected after the mutex is released, allowing a race condition where the descriptor can be freed while still in use. The fix involves adding a kernel-only reference count (descriptor_busy) to track active uses of the descriptor, preventing it from being freed while in use by rejecting close operations if the descriptor is busy.
How can this vulnerability impact me? :
This use-after-free vulnerability can lead to undefined behavior in the kernel, including potential crashes, memory corruption, or escalation of privileges. An attacker could exploit this race condition to cause denial of service or possibly execute arbitrary code within the kernel context, compromising system stability and security.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been fixed in the Linux kernel by introducing a kernel-only descriptor_busy reference count to prevent use-after-free conditions in gpib ioctl handlers.
To mitigate this vulnerability immediately, you should update your Linux kernel to a version that includes this fix.