CVE-2026-31527
概要

In the Linux kernel, the following vulnerability has been resolved:

driver core: platform: use generic driver_override infrastructure

When a driver is probed through __driver_attach(), the bus' match()
callback is called without the device lock held, thus accessing the
driver_override field without a lock, which can cause a UAF.

Fix this by using the driver-core driver_override infrastructure taking
care of proper locking internally.

Note that calling match() from __driver_attach() without the device lock
held is intentional. [1]

公表日 2026年4月22日23:16
登録日 2026年4月25日4:05
最終更新日 2026年4月24日1:17
関連情報、対策とツール
共通脆弱性一覧