Bug 2460682 (CVE-2026-31527) - CVE-2026-31527 kernel: driver core: platform: use generic driver_override infrastructure
Summary: CVE-2026-31527 kernel: driver core: platform: use generic driver_override inf...
Keywords:
Status: NEW
Alias: CVE-2026-31527
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-22 15:05 UTC by OSIDB Bzimport
Modified: 2026-04-22 20:30 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-22 15:05:10 UTC
In the Linux kernel, the following vulnerability has been resolved:

driver core: platform: use generic driver_override infrastructure

When a driver is probed through __driver_attach(), the bus' match()
callback is called without the device lock held, thus accessing the
driver_override field without a lock, which can cause a UAF.

Fix this by using the driver-core driver_override infrastructure taking
care of proper locking internally.

Note that calling match() from __driver_attach() without the device lock
held is intentional. [1]


Note You need to log in before you can comment on or make changes to this bug.