Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1706 articles · 103856 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-23475EXPLOITEDPATCHED
linux · linux kernel

spi: fix statistics allocation

Description

A vulnerability described as critical has been identified in Linux Kernel up to 7.0-rc4. The impacted element is an unknown function of the component spi. The manipulation results in null pointer dereference. This vulnerability is cataloged as CVE-2026-23475. The attack must originate from the local network. Upgrading the affected component is recommended.

Affected Products

VendorProductVersions
linuxlinux kernel6598b91b5ac32bc756d7c3000a31f775d4ead1c4, 6598b91b5ac32bc756d7c3000a31f775d4ead1c4, 6598b91b5ac32bc756d7c3000a31f775d4ead1c4, 6598b91b5ac32bc756d7c3000a31f775d4ead1c4, 6598b91b5ac32bc756d7c3000a31f775d4ead1c4, 6598b91b5ac32bc756d7c3000a31f775d4ead1c4, 6.0, 6.1.167, 6.6.130, 6.12.78, 6.18.20, 6.19.10, 7.0-rc5

References

  • https://git.kernel.org/stable/c/80c5bd0dca1cc5526ae0f4b273ccd163ed4caa4e
  • https://git.kernel.org/stable/c/f13100b1f5f111989f0750540a795fdef47492af
  • https://git.kernel.org/stable/c/df30056c78e8bead02d4be020199cabdbec0fef1
  • https://git.kernel.org/stable/c/378b295f67102eef78cf2c28105f60ae1dab5cc1
  • https://git.kernel.org/stable/c/118ce777d39f03cac99231196f820e4f998613a8
  • https://git.kernel.org/stable/c/dee0774bbb2abb172e9069ce5ffef579b12b3ae9

Related News (2 articles)

Tier C
VulDB2h ago
CVE-2026-23475 | Linux Kernel up to 7.0-rc4 spi null pointer dereference
→ No new info (linked only)
Tier C
Linux Kernel CVEs3h ago
CVE-2026-23475: spi: fix statistics allocation
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
80c5bd0dca1cc5526ae0f4b273ccd163ed4caa4ef13100b1f5f111989f0750540a795fdef47492afdf30056c78e8bead02d4be020199cabdbec0fef1378b295f67102eef78cf2c28105f60ae1dab5cc1118ce777d39f03cac99231196f820e4f998613a8dee0774bbb2abb172e9069ce5ffef579b12b3ae9
CWECWE-476
PublishedApr 3, 2026
Last enriched2h agov3
Trending Score61
Source articles2
Independent2
Info Completeness8/14
Missing: cvss, epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-23444EXP
wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure
Trending: 61
CRITICALCVE-2026-23461EXP
Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user
Trending: 61
CRITICALCVE-2026-23443EXP
ACPI: processor: Fix previous acpi_processor_errata_piix4() fix
Trending: 61
CRITICALCVE-2026-23474EXP
mtd: Avoid boot crash in RedBoot partition table parser
Trending: 61
CRITICALCVE-2026-23452EXP
PM: runtime: Fix a race condition related to device removal
Trending: 61

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Actively Exploited
Apr 3, 2026
Patch Available
Apr 3, 2026
Updated: description, affectedVersions, patchAvailable
Apr 3, 2026
Updated: description, severity, cweIds, activelyExploited
Apr 3, 2026

Version History

v3
Last enriched 2h ago
v3Tier C2h ago

Updated severity to CRITICAL, added CWE-476, and corrected exploit availability to false.

descriptionseveritycweIdsactivelyExploited
via VulDB
v2Tier C3h ago

Added CVE-2026-23475, updated affected versions, and provided detailed patch information.

descriptionaffectedVersionspatchAvailable
via Linux Kernel CVEs
v13h ago

Initial creation