Impact
The vulnerability originates in the Linux kernel's GPIB subsystem, where the IOCTL handlers, specifically IBRD, IBWRT, IBCMD, and IBWAIT, use a gpib_descriptor pointer after the big_gpib_mutex lock is released. A competing IBCLOSEDEV ioctl can free that descriptor concurrently, leading to a use‑after‑free (CWE‑911). Based on the description, it is inferred that if an attacker can invoke these IOCTLs on a GPIB device, they potentially can corrupt kernel memory, which may lead to denial of service or local privilege escalation, depending on how the corruption manifests. The fix introduces a descriptor_busy reference count that protects the descriptor during IO operations, preventing the race condition. However, until updated kernels are deployed, systems remain susceptible to this memory corruption flaw.
Affected Systems
All Linux kernel versions that include the GPIB driver are affected; the issue applies to the generic Linux:Linux platform. No specific vendor or version restrictions were provided in the advisory, so any deployment of the GPIB kernel module is considered vulnerable until patched.
Risk and Exploitability
The vulnerability is not listed in CISA KEV and the EPSS score is < 1%, making it difficult to gauge its exploitation probability. Based on the description, it is inferred that the attack vector is local, requiring an attacker to have control over a process that can send IOCTLs to the GPIB device. Based on the description, it is inferred that while the flaw permits kernel memory corruption, no publicly disclosed exploit confirms its impact. Based on the description, it is inferred that given the lack of exploitation data, the risk is considered moderate, but the potential for high impact justifies immediate attention. The CVSS score is 7.8, indicating a high severity.
OpenCVE Enrichment