CVE-2026-31389

high

Description

In the Linux kernel, the following vulnerability has been resolved: spi: fix use-after-free on controller registration failure Make sure to deregister from driver core also in the unlikely event that per-cpu statistics allocation fails during controller registration to avoid use-after-free (of driver resources) and unclocked register accesses.

References

https://git.kernel.org/stable/c/afe27c1f43aa57530011f419be6ddf71306565d2

https://git.kernel.org/stable/c/8634e05b08ead636e926022f4a98416e13440df9

https://git.kernel.org/stable/c/80f3e8cd2b4ad355b2ad2024cf423f6d183404f7

https://git.kernel.org/stable/c/6bbd385b30c7fb6c7ee0669e9ada91490938c051

https://git.kernel.org/stable/c/23b51bad2eb8787aa74324cfccefb258515ae5ba

https://git.kernel.org/stable/c/0e23f50086da7d0b183dfeac26021acfcdee086b

Details

Source: Mitre, NVD

Published: 2026-04-03

Updated: 2026-04-03

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00024