Description
In the Linux kernel, the following vulnerability has been resolved:

spi: fix use-after-free on controller registration failure

Make sure to deregister from driver core also in the unlikely event that
per-cpu statistics allocation fails during controller registration to
avoid use-after-free (of driver resources) and unclocked register
accesses.
Published: 2026-04-03
Score: 4.7 Medium
EPSS: n/a
KEV: No
Impact: Kernel memory corruption
Action: Apply Patch
AI Analysis

Impact

A use‑after‑free condition was identified in the Linux kernel’s SPI controller registration path. When per‑CPU statistics allocation fails during controller setup, the driver core deregistration was omitted, leaving driver resources dangling. If these resources are later accessed, the kernel may perform unclocked register operations on freed memory, resulting in memory corruption that can be leveraged to gain higher privileges or crash the system.

Affected Systems

All Linux kernel releases that contain the affected SPI controller code are impacted. The CNA lists the generic vendor product ‘Linux:Linux’ twice and no specific version range is provided, implying that the flaw exists across the default kernel branches at the time of the fix. Users should check the release notes for the kernel version they run to confirm whether the patch has been applied.

Risk and Exploitability

Use‑after‑free vulnerabilities in kernel code are traditionally high‑impact. Although the EPSS score is not available and the issue is not listed in CISA’s KEV catalog, the nature of the flaw (freeing driver resources before completing registration) makes it exploitable by a local attacker with capabilities to load or manipulate SPI drivers. Successful exploitation could lead to arbitrary code execution with kernel privileges or a denial‑of‑service attack that destabilizes the system.

Generated by OpenCVE AI on April 3, 2026 at 18:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the kernel version you are running and verify that it includes the commit that fixes the use‑after‑free in the SPI controller subsystem.
  • Upgrade the kernel to a release that incorporates the patch, such as the latest stable or long‑term support branch from your distribution.
  • After updating, reboot the system to ensure the new kernel image is in use.
  • If your environment requires immediate protection and an update cannot be applied, monitor for any known exploits targeting this flaw and apply any vendor‑issued workarounds if available; otherwise, restrict local module loading privileges until an update is applied.

Generated by OpenCVE AI on April 3, 2026 at 18:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-825
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: spi: fix use-after-free on controller registration failure Make sure to deregister from driver core also in the unlikely event that per-cpu statistics allocation fails during controller registration to avoid use-after-free (of driver resources) and unclocked register accesses.
Title spi: fix use-after-free on controller registration failure
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T15:15:55.068Z

Reserved: 2026-03-09T15:48:24.084Z

Link: CVE-2026-31389

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:36.823

Modified: 2026-04-03T16:16:36.823

Link: CVE-2026-31389

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-31389 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:15:38Z

Weaknesses