๐Ÿ” CVE Alert

CVE-2026-31485

UNKNOWN 0.0

spi: spi-fsl-lpspi: fix teardown order issue (UAF)

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: spi: spi-fsl-lpspi: fix teardown order issue (UAF) There is a teardown order issue in the driver. The SPI controller is registered using devm_spi_register_controller(), which delays unregistration of the SPI controller until after the fsl_lpspi_remove() function returns. As the fsl_lpspi_remove() function synchronously tears down the DMA channels, a running SPI transfer triggers the following NULL pointer dereference due to use after free: | fsl_lpspi 42550000.spi: I/O Error in DMA RX | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 [...] | Call trace: | fsl_lpspi_dma_transfer+0x260/0x340 [spi_fsl_lpspi] | fsl_lpspi_transfer_one+0x198/0x448 [spi_fsl_lpspi] | spi_transfer_one_message+0x49c/0x7c8 | __spi_pump_transfer_message+0x120/0x420 | __spi_sync+0x2c4/0x520 | spi_sync+0x34/0x60 | spidev_message+0x20c/0x378 [spidev] | spidev_ioctl+0x398/0x750 [spidev] [...] Switch from devm_spi_register_controller() to spi_register_controller() in fsl_lpspi_probe() and add the corresponding spi_unregister_controller() in fsl_lpspi_remove().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 22, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5314987de5e5f5e38436ef4a69328bc472bbd63e < fbe6f40caeebb0b1ea9dfedc259124c1d3cda7a6 5314987de5e5f5e38436ef4a69328bc472bbd63e < ca4483f36ac1b62e69f8b182c5b8f059e0abecfb 5314987de5e5f5e38436ef4a69328bc472bbd63e < e3fd54f8b0317fbccc103961ddd660f2a32dcf0b 5314987de5e5f5e38436ef4a69328bc472bbd63e < adb25339b66112393fd6892ceff926765feb5b86 5314987de5e5f5e38436ef4a69328bc472bbd63e < d5d01f24bc6fbde40b4e567ef9160194b61267bc 5314987de5e5f5e38436ef4a69328bc472bbd63e < e89e2b97253c124d37bf88e96e5e8ce5c3aeeec3 5314987de5e5f5e38436ef4a69328bc472bbd63e < 15650dfbaeeb14bcaaf053b93cf631db8d465300 5314987de5e5f5e38436ef4a69328bc472bbd63e < b341c1176f2e001b3adf0b47154fc31589f7410e
Linux / Linux
4.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/fbe6f40caeebb0b1ea9dfedc259124c1d3cda7a6 git.kernel.org: https://git.kernel.org/stable/c/ca4483f36ac1b62e69f8b182c5b8f059e0abecfb git.kernel.org: https://git.kernel.org/stable/c/e3fd54f8b0317fbccc103961ddd660f2a32dcf0b git.kernel.org: https://git.kernel.org/stable/c/adb25339b66112393fd6892ceff926765feb5b86 git.kernel.org: https://git.kernel.org/stable/c/d5d01f24bc6fbde40b4e567ef9160194b61267bc git.kernel.org: https://git.kernel.org/stable/c/e89e2b97253c124d37bf88e96e5e8ce5c3aeeec3 git.kernel.org: https://git.kernel.org/stable/c/15650dfbaeeb14bcaaf053b93cf631db8d465300 git.kernel.org: https://git.kernel.org/stable/c/b341c1176f2e001b3adf0b47154fc31589f7410e