Description
In the Linux kernel, the following vulnerability has been resolved:

reset: gpio: suppress bind attributes in sysfs

This is a special device that's created dynamically and is supposed to
stay in memory forever. We also currently don't have a devlink between
it and the actual reset consumer. Suppress sysfs bind attributes so that
user-space can't unbind the device because - as of now - it will cause a
use-after-free splat from any user that puts the reset control handle.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel contains a flaw in the handling of a dynamic reset GPIO device. The device, which is intended to live in memory indefinitely, exposes sysfs bind attributes that allow user space to unbind it. If an attacker unbinds the device, the kernel dereferences freed memory, resulting in a use‑after‑free condition. This vulnerability can corrupt memory and may enable arbitrary code execution or a denial‑of‑service scenario. The weakness is a classic use‑after‑free.

Affected Systems

All kernel releases prior to the patch that suppresses the reset GPIO device’s sysfs bind attributes are affected. The vulnerability is not limited to a specific vendor or version; any kernel that includes the unprotected bind attribute when the device is present is susceptible.

Risk and Exploitability

Exploitation requires the attacker to write to the sysfs bind attribute, which normally needs local user privileges with access to the device’s directory in /sys. The likely attack vector is inferred from the description of user‑space ability to unbind the device. The CVSS score is not published and the EPSS value is unavailable, but the vulnerability is not listed in the CISA KEV catalog. Consequently, the risk is confined to local users who can manipulate sysfs entries; remote exploitation remains unlikely without additional escalation vectors.

Generated by OpenCVE AI on May 6, 2026 at 16:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the patch suppressing the sysfs bind attributes for reset GPIO devices.
  • Verify that the corresponding sysfs directories for reset GPIO devices no longer expose bind attributes, ensuring that write permissions are removed for non‑privileged users.
  • If a kernel upgrade cannot be performed immediately, enforce stricter file‑system permissions or apply SELinux/AppArmor policies to deny write access to any bind attribute under the reset device’s sysfs path.

Generated by OpenCVE AI on May 6, 2026 at 16:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: reset: gpio: suppress bind attributes in sysfs This is a special device that's created dynamically and is supposed to stay in memory forever. We also currently don't have a devlink between it and the actual reset consumer. Suppress sysfs bind attributes so that user-space can't unbind the device because - as of now - it will cause a use-after-free splat from any user that puts the reset control handle.
Title reset: gpio: suppress bind attributes in sysfs
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:24.232Z

Reserved: 2026-05-01T14:12:55.988Z

Link: CVE-2026-43138

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:31.117

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43138

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T16:30:06Z

Weaknesses