VYPR
High severity7.8NVD Advisory· Published Apr 3, 2026· Updated May 20, 2026

CVE-2026-31389

CVE-2026-31389

Description

In the Linux kernel, the following vulnerability has been resolved:

spi: fix use-after-free on controller registration failure

Make sure to deregister from driver core also in the unlikely event that per-cpu statistics allocation fails during controller registration to avoid use-after-free (of driver resources) and unclocked register accesses.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Linux kernel SPI subsystem during controller registration when per-CPU statistics allocation fails.

In the Linux kernel's SPI subsystem, when registering a controller, if the allocation of per-CPU statistics fails, the driver core is not properly deregistered, leading to a use-after-free condition. This occurs because the error path does not call the necessary cleanup routines, leaving stale references to freed driver resources [1][2].

Exploitation requires a local attacker with the ability to trigger the specific failure condition during SPI controller registration. The vulnerability is not remotely exploitable and requires system access. The attack surface is limited to systems where SPI controllers are dynamically registered and where memory allocation can be forced to fail [3].

An attacker who successfully triggers this use-after-free could execute arbitrary code or cause a denial of service. The freed memory may be reused, leading to potential privilege escalation or system instability. Additionally, unclocked register accesses could corrupt hardware state [4].

The fix is included in the Linux kernel stable tree with the referenced commits. Users should update to a patched kernel version. There are no known workarounds other than applying the patch.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.