CVE-2026-31389
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
03/04/2026
Última modificación:
03/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
spi: fix use-after-free on controller registration failure<br />
<br />
Make sure to deregister from driver core also in the unlikely event that<br />
per-cpu statistics allocation fails during controller registration to<br />
avoid use-after-free (of driver resources) and unclocked register<br />
accesses.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/0e23f50086da7d0b183dfeac26021acfcdee086b
- https://git.kernel.org/stable/c/23b51bad2eb8787aa74324cfccefb258515ae5ba
- https://git.kernel.org/stable/c/6bbd385b30c7fb6c7ee0669e9ada91490938c051
- https://git.kernel.org/stable/c/80f3e8cd2b4ad355b2ad2024cf423f6d183404f7
- https://git.kernel.org/stable/c/8634e05b08ead636e926022f4a98416e13440df9
- https://git.kernel.org/stable/c/afe27c1f43aa57530011f419be6ddf71306565d2



