CVE-2026-31527
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
22/04/2026
Última modificación:
23/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
driver core: platform: use generic driver_override infrastructure<br />
<br />
When a driver is probed through __driver_attach(), the bus&#39; match()<br />
callback is called without the device lock held, thus accessing the<br />
driver_override field without a lock, which can cause a UAF.<br />
<br />
Fix this by using the driver-core driver_override infrastructure taking<br />
care of proper locking internally.<br />
<br />
Note that calling match() from __driver_attach() without the device lock<br />
held is intentional. [1]



