CVE-2026-23068

CWE-4158 documents8 sources
Severity
7.8HIGH
EPSS
0.0%
top 95.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 4
Latest updateFeb 10

Description

In the Linux kernel, the following vulnerability has been resolved: spi: spi-sprd-adi: Fix double free in probe error path The driver currently uses spi_alloc_host() to allocate the controller but registers it using devm_spi_register_controller(). If devm_register_restart_handler() fails, the code jumps to the put_ctlr label and calls spi_controller_put(). However, since the controller was registered via a devm function, the device core will automatically call spi_controller_put() again when

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel4.176.1.162+4
CVEListV5linux/linuxac1775012058e13ef1522938e27f5973d9e3f053bddd3d10d039729b81cfb0804520c8832a701a0e+5
Debianlinux< 6.1.162-1+2
Debianlinux-6.1< 6.1.162-1~deb11u1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-2r6w-8qqx-7jq3: In the Linux kernel, the following vulnerability has been resolved: spi: spi-sprd-adi: Fix double free in probe error path The driver currently uses2026-02-04
OSV
CVE-2026-23068: In the Linux kernel, the following vulnerability has been resolved: spi: spi-sprd-adi: Fix double free in probe error path The driver currently uses s2026-02-04
CVEList
spi: spi-sprd-adi: Fix double free in probe error path2026-02-04

📋Vendor Advisories

3
Microsoft
spi: spi-sprd-adi: Fix double free in probe error path2026-02-10
Red Hat
kernel: spi: spi-sprd-adi: Fix double free in probe error path2026-02-04
Debian
CVE-2026-23068: linux - In the Linux kernel, the following vulnerability has been resolved: spi: spi-sp...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23068 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23068 (HIGH CVSS 7.8) | In the Linux kernel | cvebase.io