SB2026041411 - Use-after-free in Linux kernel acpi driver
Published: April 14, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2026-31426)
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to use-after-free in acpi_ec_space_handler() when handling AML evaluation that accesses an EC OpRegion field after probe deferral leaves a stale handler context. A local user can trigger a sysfs read that causes AML to touch an EC OpRegion to cause a denial of service.
The issue occurs on reduced-hardware EC platforms when the GPIO IRQ provider defers probing.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/022d1727f33ff90b3e1775125264e3023901952e
- https://git.kernel.org/stable/c/808c0f156f48d5b8ca34088cbbfba8444e606cbc
- https://git.kernel.org/stable/c/9c886e63b69658959633937e3acb7ca8addf7499
- https://git.kernel.org/stable/c/be1a827e15991e874e0d5222d0ea5fdad01960fe
- https://git.kernel.org/stable/c/d04c007047c88158141d9bd5eac761cdadd3782c
- https://git.kernel.org/stable/c/f6484cadbcaf26b5844b51bd7307a663dda48ef6