SB2026040652 - Use-after-free in Linux kernel spi driver
Published: April 6, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2026-31389)
The vulnerability allows a local attacker to cause a denial of service.
The vulnerability exists due to use-after-free in the spi controller registration logic when handling controller registration failure. A local attacker can trigger controller registration failure to cause a denial of service.
The issue occurs if per-cpu statistics allocation fails during controller registration, which can lead to use-after-free of driver resources and unclocked register accesses.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/0e23f50086da7d0b183dfeac26021acfcdee086b
- https://git.kernel.org/stable/c/23b51bad2eb8787aa74324cfccefb258515ae5ba
- https://git.kernel.org/stable/c/6bbd385b30c7fb6c7ee0669e9ada91490938c051
- https://git.kernel.org/stable/c/80f3e8cd2b4ad355b2ad2024cf423f6d183404f7
- https://git.kernel.org/stable/c/8634e05b08ead636e926022f4a98416e13440df9
- https://git.kernel.org/stable/c/afe27c1f43aa57530011f419be6ddf71306565d2