CVE-2026-23068
Severity CVSS v4.0:
Pending analysis
Type:
CWE-415
Double Free
Publication date:
04/02/2026
Last modified:
13/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
spi: spi-sprd-adi: Fix double free in probe error path<br />
<br />
The driver currently uses spi_alloc_host() to allocate the controller<br />
but registers it using devm_spi_register_controller().<br />
<br />
If devm_register_restart_handler() fails, the code jumps to the<br />
put_ctlr label and calls spi_controller_put(). However, since the<br />
controller was registered via a devm function, the device core will<br />
automatically call spi_controller_put() again when the probe fails.<br />
This results in a double-free of the spi_controller structure.<br />
<br />
Fix this by switching to devm_spi_alloc_host() and removing the<br />
manual spi_controller_put() call.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.17 (including) | 6.1.162 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.122 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.68 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/346775f2b4cf839177e8e86b94aa180a06dc15b0
- https://git.kernel.org/stable/c/383d4f5cffcc8df930d95b06518a9d25a6d74aac
- https://git.kernel.org/stable/c/417cdfd9b9f986e95bfcb1d68eb443e6e0a15f8c
- https://git.kernel.org/stable/c/bddd3d10d039729b81cfb0804520c8832a701a0e
- https://git.kernel.org/stable/c/f6d6b3f172df118db582fe5ec43ae223a55d99cf



