EUVD-2026-18761

| CVE-2026-31389
2026-04-03 Linux

Lifecycle Timeline

3
Analysis Generated
Apr 03, 2026 - 15:30 vuln.today
EUVD ID Assigned
Apr 03, 2026 - 15:30 euvd
EUVD-2026-18761
CVE Published
Apr 03, 2026 - 15:15 nvd
N/A

Description

In the Linux kernel, the following vulnerability has been resolved: spi: fix use-after-free on controller registration failure Make sure to deregister from driver core also in the unlikely event that per-cpu statistics allocation fails during controller registration to avoid use-after-free (of driver resources) and unclocked register accesses.

Analysis

Use-after-free vulnerability in Linux kernel SPI controller registration allows local attackers to trigger unclocked register accesses and potential information disclosure when per-CPU statistics allocation fails during controller initialization. The vulnerability affects all Linux kernel versions and is fixed via proper driver core deregistration on allocation failure; no CVSS score or active exploitation data available at time of analysis.

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

0
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +0
POC: 0

Share

EUVD-2026-18761 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy