CVE-2026-31389Expired Pointer Dereference in Linux

Severity
4.7MEDIUM
No vector
EPSS
0.0%
top 90.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 3

Description

In the Linux kernel, the following vulnerability has been resolved: spi: fix use-after-free on controller registration failure Make sure to deregister from driver core also in the unlikely event that per-cpu statistics allocation fails during controller registration to avoid use-after-free (of driver resources) and unclocked register accesses.

Affected Packages3 packages

Debianlinux/linux_kernel< 6.19.10-1
CVEListV5linux/linux6598b91b5ac32bc756d7c3000a31f775d4ead1c40e23f50086da7d0b183dfeac26021acfcdee086b+6
debiandebian/linux< linux 6.19.10-1 (forky)

🔴Vulnerability Details

2
OSV
CVE-2026-31389: In the Linux kernel, the following vulnerability has been resolved: spi: fix use-after-free on controller registration failure Make sure to deregister2026-04-03
GHSA
GHSA-7jq8-3vqq-qc62: In the Linux kernel, the following vulnerability has been resolved: spi: fix use-after-free on controller registration failure Make sure to deregist2026-04-03

📋Vendor Advisories

2
Red Hat
kernel: spi: fix use-after-free on controller registration failure2026-04-03
Debian
CVE-2026-31389: linux - In the Linux kernel, the following vulnerability has been resolved: spi: fix us...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-31389 Impact, Exploitability, and Mitigation Steps | Wiz