VYPR
Medium severity5.5NVD Advisory· Published Apr 3, 2026· Updated Apr 23, 2026

CVE-2026-23431

CVE-2026-23431

Description

In the Linux kernel, the following vulnerability has been resolved:

spi: amlogic-spisg: Fix memory leak in aml_spisg_probe()

In aml_spisg_probe(), ctlr is allocated by spi_alloc_target()/spi_alloc_host(), but fails to call spi_controller_put() in several error paths. This leads to a memory leak whenever the driver fails to probe after the initial allocation.

Convert to use devm_spi_alloc_host()/devm_spi_alloc_target() to fix the memory leak.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Memory leak in Amlogic SPI driver probe due to missing spi_controller_put() in error paths; fixed with devm_ variants.

Vulnerability

In the Linux kernel's Amlogic SPI driver (spi-amlogic-spisg), the probe function aml_spisg_probe() allocates a SPI controller structure using spi_alloc_target() or spi_alloc_host() but fails to release it via spi_controller_put() in several error paths. This results in a memory leak whenever the driver probe fails after allocation [1][2][3].

Exploitation

An attacker would need to trigger a probe failure of the amlogic-spisg driver, which could be achieved through system configuration or hotplug events. The vulnerability does not require authentication or special privileges beyond the ability to cause the driver to bind to a device and fail.

Impact

The memory leak can lead to gradual memory exhaustion, potentially causing system instability or denial of service if the driver repeatedly fails to probe. No other security impact, such as code execution or privilege escalation, has been identified.

Mitigation

The fix converts the allocation to use devm_spi_alloc_host() / devm_spi_alloc_target(), which automatically frees the controller on probe failure. Patches have been merged into the Linux kernel stable branches [1][2][3].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

10
  • Linux/Kernel10 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 9 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.17.1,<6.18.20
    • cpe:2.3:o:linux:linux_kernel:6.17:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.