CVE-2026-23431
Description
In the Linux kernel, the following vulnerability has been resolved:
spi: amlogic-spisg: Fix memory leak in aml_spisg_probe()
In aml_spisg_probe(), ctlr is allocated by spi_alloc_target()/spi_alloc_host(), but fails to call spi_controller_put() in several error paths. This leads to a memory leak whenever the driver fails to probe after the initial allocation.
Convert to use devm_spi_alloc_host()/devm_spi_alloc_target() to fix the memory leak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Memory leak in Amlogic SPI driver probe due to missing spi_controller_put() in error paths; fixed with devm_ variants.
Vulnerability
In the Linux kernel's Amlogic SPI driver (spi-amlogic-spisg), the probe function aml_spisg_probe() allocates a SPI controller structure using spi_alloc_target() or spi_alloc_host() but fails to release it via spi_controller_put() in several error paths. This results in a memory leak whenever the driver probe fails after allocation [1][2][3].
Exploitation
An attacker would need to trigger a probe failure of the amlogic-spisg driver, which could be achieved through system configuration or hotplug events. The vulnerability does not require authentication or special privileges beyond the ability to cause the driver to bind to a device and fail.
Impact
The memory leak can lead to gradual memory exhaustion, potentially causing system instability or denial of service if the driver repeatedly fails to probe. No other security impact, such as code execution or privilege escalation, has been identified.
Mitigation
The fix converts the allocation to use devm_spi_alloc_host() / devm_spi_alloc_target(), which automatically frees the controller on probe failure. Patches have been merged into the Linux kernel stable branches [1][2][3].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
10cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 9 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.17.1,<6.18.20
- cpe:2.3:o:linux:linux_kernel:6.17:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
- (no CPE)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.