spi: fix use-after-free on controller registration failure
Summary
| CVE | CVE-2026-31389 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-03 16:16:36 UTC |
| Updated | 2026-04-03 16:16:36 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
spi: fix use-after-free on controller registration failure
Make sure to deregister from driver core also in the unlikely event that
per-cpu statistics allocation fails during controller registration to
avoid use-after-free (of driver resources) and unclocked register
accesses. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 6598b91b5ac32bc756d7c3000a31f775d4ead1c4 0e23f50086da7d0b183dfeac26021acfcdee086b git |
Not specified |
| CNA |
Linux |
Linux |
affected 6598b91b5ac32bc756d7c3000a31f775d4ead1c4 6bbd385b30c7fb6c7ee0669e9ada91490938c051 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6598b91b5ac32bc756d7c3000a31f775d4ead1c4 afe27c1f43aa57530011f419be6ddf71306565d2 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6598b91b5ac32bc756d7c3000a31f775d4ead1c4 80f3e8cd2b4ad355b2ad2024cf423f6d183404f7 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6598b91b5ac32bc756d7c3000a31f775d4ead1c4 23b51bad2eb8787aa74324cfccefb258515ae5ba git |
Not specified |
| CNA |
Linux |
Linux |
affected 6598b91b5ac32bc756d7c3000a31f775d4ead1c4 8634e05b08ead636e926022f4a98416e13440df9 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6.0 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.0 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.167 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.130 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.78 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.20 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.10 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0-rc5 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/6bbd385b30c7fb6c7ee0669e9ada91490938c051 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/afe27c1f43aa57530011f419be6ddf71306565d2 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/23b51bad2eb8787aa74324cfccefb258515ae5ba |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/80f3e8cd2b4ad355b2ad2024cf423f6d183404f7 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/8634e05b08ead636e926022f4a98416e13440df9 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/0e23f50086da7d0b183dfeac26021acfcdee086b |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.