spi: meson-spicc: Fix double-put in remove path
Summary
| CVE | CVE-2026-31489 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:46 UTC |
| Updated | 2026-04-22 14:16:46 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
spi: meson-spicc: Fix double-put in remove path
meson_spicc_probe() registers the controller with
devm_spi_register_controller(), so teardown already drops the
controller reference via devm cleanup.
Calling spi_controller_put() again in meson_spicc_remove()
causes a double-put. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 8311ee2164c5cd1b63a601ea366f540eae89f10e 40ad0334c17b23d8b66b1082ad1478a6202e90e2 git |
Not specified |
| CNA |
Linux |
Linux |
affected 8311ee2164c5cd1b63a601ea366f540eae89f10e da06a104f0486355073ff0d1bcb1fcbebb7080d6 git |
Not specified |
| CNA |
Linux |
Linux |
affected 8311ee2164c5cd1b63a601ea366f540eae89f10e 9b812ceb75a6260c17c91db4b9e74ead8cfa06f5 git |
Not specified |
| CNA |
Linux |
Linux |
affected 8311ee2164c5cd1b63a601ea366f540eae89f10e 63542bb402b7013171c9f621c28b609eda4dbf1f git |
Not specified |
| CNA |
Linux |
Linux |
affected ff056817560d72363b463ddac27822dc8c121280 git |
Not specified |
| CNA |
Linux |
Linux |
affected 683b47d0ebb10ba0d272604b09686e023d10d40c git |
Not specified |
| CNA |
Linux |
Linux |
affected a5bf7ef13ebf6adf62a69ab3542d4fc0564c082e git |
Not specified |
| CNA |
Linux |
Linux |
affected 05565b469358a9a03034f7f712d83590a9f125a4 git |
Not specified |
| CNA |
Linux |
Linux |
affected f2ca988aba4eaad1319e80eb1316a4ba5dbd6897 git |
Not specified |
| CNA |
Linux |
Linux |
affected 5.14 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.14 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.80 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.21 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.11 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/40ad0334c17b23d8b66b1082ad1478a6202e90e2 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/da06a104f0486355073ff0d1bcb1fcbebb7080d6 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/63542bb402b7013171c9f621c28b609eda4dbf1f |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/9b812ceb75a6260c17c91db4b9e74ead8cfa06f5 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.