In the Linux kernel, the following vulnerability has been resolved: reset: gpio: suppress bind attributes in sysfs This is a special device that's created dynamically and is supposed to stay in memory forever. We also currently don't have a devlink between it and the actual reset consumer. Suppress sysfs bind attributes so that user-space can't unbind the device because - as of now - it will cause a use-after-free splat from any user that puts the reset control handle.
https://git.kernel.org/stable/c/76801c3dfca0ac6339a23e9615b5f23e25b8644c
https://git.kernel.org/stable/c/1d7d869f074f98c34fe23f6a56e5f3acc1f95a2b
https://git.kernel.org/stable/c/16de4c6a8fe9ff497ca1aba33ef0dbee09f11952
https://git.kernel.org/stable/c/09d6efc6abd42809956d598906c222ccd1c8ae92