Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1771 articles · 103891 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-23475EXPLOITEDPATCHED
linux · linux kernel

spi: fix statistics allocation

Description

A vulnerability described as critical has been identified in Linux Kernel up to 7.0-rc4. The impacted element is an unknown function of the component spi. The manipulation results in null pointer dereference. This vulnerability is cataloged as CVE-2026-23475. The attack must originate from the local network. Upgrading the affected component is recommended.

Affected Products

VendorProductVersions
linuxlinux kernel6598b91b5ac32bc756d7c3000a31f775d4ead1c4, 6598b91b5ac32bc756d7c3000a31f775d4ead1c4, 6598b91b5ac32bc756d7c3000a31f775d4ead1c4, 6598b91b5ac32bc756d7c3000a31f775d4ead1c4, 6598b91b5ac32bc756d7c3000a31f775d4ead1c4, 6598b91b5ac32bc756d7c3000a31f775d4ead1c4, 6.0, 6.1.167, 6.6.130, 6.12.78, 6.18.20, 6.19.10, 7.0-rc5

References

  • https://git.kernel.org/stable/c/80c5bd0dca1cc5526ae0f4b273ccd163ed4caa4e
  • https://git.kernel.org/stable/c/f13100b1f5f111989f0750540a795fdef47492af
  • https://git.kernel.org/stable/c/df30056c78e8bead02d4be020199cabdbec0fef1
  • https://git.kernel.org/stable/c/378b295f67102eef78cf2c28105f60ae1dab5cc1
  • https://git.kernel.org/stable/c/118ce777d39f03cac99231196f820e4f998613a8
  • https://git.kernel.org/stable/c/dee0774bbb2abb172e9069ce5ffef579b12b3ae9

Related News (2 articles)

Tier C
VulDB5h ago
CVE-2026-23475 | Linux Kernel up to 7.0-rc4 spi null pointer dereference
→ No new info (linked only)
Tier C
Linux Kernel CVEs5h ago
CVE-2026-23475: spi: fix statistics allocation
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
80c5bd0dca1cc5526ae0f4b273ccd163ed4caa4ef13100b1f5f111989f0750540a795fdef47492afdf30056c78e8bead02d4be020199cabdbec0fef1378b295f67102eef78cf2c28105f60ae1dab5cc1118ce777d39f03cac99231196f820e4f998613a8dee0774bbb2abb172e9069ce5ffef579b12b3ae9
CWECWE-476
PublishedApr 3, 2026
Last enriched4h agov3
Trending Score60
Source articles2
Independent2
Info Completeness8/14
Missing: cvss, epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-31393EXP
Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access
Trending: 60
CRITICALCVE-2026-31397EXP
mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd()
Trending: 60
CRITICALCVE-2026-23463EXP
soc: fsl: qbman: fix race condition in qman_destroy_fq
Trending: 60
CRITICALCVE-2026-23472EXP
serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN
Trending: 60
CRITICALCVE-2026-23438EXP
net: mvpp2: guard flow control update with global_tx_fc in buffer switching
Trending: 60

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Actively Exploited
Apr 3, 2026
Patch Available
Apr 3, 2026
Updated: description, affectedVersions, patchAvailable
Apr 3, 2026
Updated: description, severity, cweIds, activelyExploited
Apr 3, 2026

Version History

v3
Last enriched 4h ago
v3Tier C4h ago

Updated severity to CRITICAL, added CWE-476, and corrected exploit availability to false.

descriptionseveritycweIdsactivelyExploited
via VulDB
v2Tier C5h ago

Added CVE-2026-23475, updated affected versions, and provided detailed patch information.

descriptionaffectedVersionspatchAvailable
via Linux Kernel CVEs
v15h ago

Initial creation