CVE-2026-31389
Use-After-Free in Linux Kernel SPI Controller Registration
Publication date: 2026-04-03
Last updated on: 2026-04-27
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The use-after-free vulnerability can cause the system to access freed memory, which may lead to system instability, crashes, or potential execution of arbitrary code.
Such issues can compromise the reliability and security of the Linux kernel, potentially affecting any system using the vulnerable SPI controller registration code.
Can you explain this vulnerability to me?
This vulnerability is a use-after-free issue in the Linux kernel related to the SPI (Serial Peripheral Interface) controller registration process.
Specifically, if the allocation of per-CPU statistics fails during the controller registration, the driver does not properly deregister from the driver core. This leads to use-after-free of driver resources and unclocked register accesses.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by fixing the use-after-free issue in the Linux kernel related to SPI controller registration failure.
To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.