-
CVE-2026-23068
- EPSS -
- Veröffentlicht 04.02.2026 16:07:49
- Zuletzt bearbeitet 04.02.2026 17:16:17
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: spi: spi-sprd-adi: Fix double free in probe error path The driver currently uses spi_alloc_host() to allocate the controller but registers it using devm_spi_register_controller(). If devm_register_restart_handler() fails, the code jumps to the put_ctlr label and calls spi_controller_put(). However, since the controller was registered via a devm function, the device core will automatically call spi_controller_put() again when the probe fails. This results in a double-free of the spi_controller structure. Fix this by switching to devm_spi_alloc_host() and removing the manual spi_controller_put() call.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
417cdfd9b9f986e95bfcb1d68eb443e6e0a15f8c
Version
ac1775012058e13ef1522938e27f5973d9e3f053
Status
affected
Version <
346775f2b4cf839177e8e86b94aa180a06dc15b0
Version
ac1775012058e13ef1522938e27f5973d9e3f053
Status
affected
Version <
f6d6b3f172df118db582fe5ec43ae223a55d99cf
Version
ac1775012058e13ef1522938e27f5973d9e3f053
Status
affected
Version <
383d4f5cffcc8df930d95b06518a9d25a6d74aac
Version
ac1775012058e13ef1522938e27f5973d9e3f053
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.17
Status
affected
Version <
4.17
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.122
Status
unaffected
Version <=
6.12.*
Version
6.12.68
Status
unaffected
Version <=
6.18.*
Version
6.18.8
Status
unaffected
Version <=
*
Version
6.19-rc7
Status
unaffected