In the Linux kernel, the following vulnerability has been resolved:
spi: meson-spicc: Fix double-put in remove path
meson_spicc_probe() registers the controller with
devm_spi_register_controller(), so teardown already drops the
controller reference via devm cleanup.
Calling spi_controller_put() again in meson_spicc_remove()
causes a double-put.
References
Configurations
Configuration 1 (hide)
|
History
28 Apr 2026, 12:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/40ad0334c17b23d8b66b1082ad1478a6202e90e2 - Patch | |
| References | () https://git.kernel.org/stable/c/63542bb402b7013171c9f621c28b609eda4dbf1f - Patch | |
| References | () https://git.kernel.org/stable/c/9b812ceb75a6260c17c91db4b9e74ead8cfa06f5 - Patch | |
| References | () https://git.kernel.org/stable/c/da06a104f0486355073ff0d1bcb1fcbebb7080d6 - Patch | |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | CWE-415 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* |
22 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-22 14:16
Updated : 2026-04-28 12:57
NVD link : CVE-2026-31489
Mitre link : CVE-2026-31489
CVE.ORG link : CVE-2026-31489
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free
