{"api_version":"1","generated_at":"2026-04-22T17:48:40+00:00","cve":"CVE-2026-31527","urls":{"html":"https://cve.report/CVE-2026-31527","api":"https://cve.report/api/cve/CVE-2026-31527.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-31527","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-31527"},"summary":{"title":"driver core: platform: use generic driver_override infrastructure","description":"In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: platform: use generic driver_override infrastructure\n\nWhen a driver is probed through __driver_attach(), the bus' match()\ncallback is called without the device lock held, thus accessing the\ndriver_override field without a lock, which can cause a UAF.\n\nFix this by using the driver-core driver_override infrastructure taking\ncare of proper locking internally.\n\nNote that calling match() from __driver_attach() without the device lock\nheld is intentional. [1]","state":"PUBLISHED","assigner":"Linux","published_at":"2026-04-22 14:16:52","updated_at":"2026-04-22 14:16:52"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/7c02a9bd7d14a89065fcf672b86d8e1d1a41d3b1","name":"https://git.kernel.org/stable/c/7c02a9bd7d14a89065fcf672b86d8e1d1a41d3b1","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/9a6086d2a828dd2ff74cf9abcae456670febd71f","name":"https://git.kernel.org/stable/c/9a6086d2a828dd2ff74cf9abcae456670febd71f","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/edee7ee5a14c3b33f6d54641f5af5c5e9180992d","name":"https://git.kernel.org/stable/c/edee7ee5a14c3b33f6d54641f5af5c5e9180992d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/2b38efc05bf7a8568ec74bfffea0f5cfa62bc01d","name":"https://git.kernel.org/stable/c/2b38efc05bf7a8568ec74bfffea0f5cfa62bc01d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-31527","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31527","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 3d713e0e382e6fcfb4bba1501645b66c129ad60b 9a6086d2a828dd2ff74cf9abcae456670febd71f git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 3d713e0e382e6fcfb4bba1501645b66c129ad60b 7c02a9bd7d14a89065fcf672b86d8e1d1a41d3b1 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 3d713e0e382e6fcfb4bba1501645b66c129ad60b edee7ee5a14c3b33f6d54641f5af5c5e9180992d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 3d713e0e382e6fcfb4bba1501645b66c129ad60b 2b38efc05bf7a8568ec74bfffea0f5cfa62bc01d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 3.17","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 3.17 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.80 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.21 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.11 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/base/platform.c","drivers/bus/simple-pm-bus.c","drivers/clk/imx/clk-scu.c","drivers/slimbus/qcom-ngd-ctrl.c","include/linux/platform_device.h","sound/soc/samsung/i2s.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"9a6086d2a828dd2ff74cf9abcae456670febd71f","status":"affected","version":"3d713e0e382e6fcfb4bba1501645b66c129ad60b","versionType":"git"},{"lessThan":"7c02a9bd7d14a89065fcf672b86d8e1d1a41d3b1","status":"affected","version":"3d713e0e382e6fcfb4bba1501645b66c129ad60b","versionType":"git"},{"lessThan":"edee7ee5a14c3b33f6d54641f5af5c5e9180992d","status":"affected","version":"3d713e0e382e6fcfb4bba1501645b66c129ad60b","versionType":"git"},{"lessThan":"2b38efc05bf7a8568ec74bfffea0f5cfa62bc01d","status":"affected","version":"3d713e0e382e6fcfb4bba1501645b66c129ad60b","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/base/platform.c","drivers/bus/simple-pm-bus.c","drivers/clk/imx/clk-scu.c","drivers/slimbus/qcom-ngd-ctrl.c","include/linux/platform_device.h","sound/soc/samsung/i2s.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"3.17"},{"lessThan":"3.17","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.80","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.21","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.11","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.80","versionStartIncluding":"3.17","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.21","versionStartIncluding":"3.17","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.11","versionStartIncluding":"3.17","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"3.17","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: platform: use generic driver_override infrastructure\n\nWhen a driver is probed through __driver_attach(), the bus' match()\ncallback is called without the device lock held, thus accessing the\ndriver_override field without a lock, which can cause a UAF.\n\nFix this by using the driver-core driver_override infrastructure taking\ncare of proper locking internally.\n\nNote that calling match() from __driver_attach() without the device lock\nheld is intentional. [1]"}],"providerMetadata":{"dateUpdated":"2026-04-22T13:54:40.485Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/9a6086d2a828dd2ff74cf9abcae456670febd71f"},{"url":"https://git.kernel.org/stable/c/7c02a9bd7d14a89065fcf672b86d8e1d1a41d3b1"},{"url":"https://git.kernel.org/stable/c/edee7ee5a14c3b33f6d54641f5af5c5e9180992d"},{"url":"https://git.kernel.org/stable/c/2b38efc05bf7a8568ec74bfffea0f5cfa62bc01d"}],"title":"driver core: platform: use generic driver_override infrastructure","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-31527","datePublished":"2026-04-22T13:54:40.485Z","dateReserved":"2026-03-09T15:48:24.111Z","dateUpdated":"2026-04-22T13:54:40.485Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-22 14:16:52","lastModifiedDate":"2026-04-22 14:16:52","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"31527","Ordinal":"1","Title":"driver core: platform: use generic driver_override infrastructur","CVE":"CVE-2026-31527","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"31527","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: platform: use generic driver_override infrastructure\n\nWhen a driver is probed through __driver_attach(), the bus' match()\ncallback is called without the device lock held, thus accessing the\ndriver_override field without a lock, which can cause a UAF.\n\nFix this by using the driver-core driver_override infrastructure taking\ncare of proper locking internally.\n\nNote that calling match() from __driver_attach() without the device lock\nheld is intentional. [1]","Type":"Description","Title":"driver core: platform: use generic driver_override infrastructur"}]}}}