CVE-2024-26866

Source
https://cve.org/CVERecord?id=CVE-2024-26866
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26866.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26866
Downstream
Related
Published
2024-04-17T10:27:28.163Z
Modified
2026-03-14T12:30:01.756509Z
Summary
spi: lpspi: Avoid potential use-after-free in probe()
Details

In the Linux kernel, the following vulnerability has been resolved:

spi: lpspi: Avoid potential use-after-free in probe()

fsllpspiprobe() is allocating/disposing memory manually with spiallochost()/spialloctarget(), but uses devmspiregistercontroller(). In case of error after the latter call the memory will be explicitly freed in the probe function by spicontrollerput() call, but used afterwards by "devm" management outside probe() (spiunregistercontroller() <- devmspi_unregister() below).

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070 ... Call trace: kernfsfindns kernfsfindandgetns sysfsremovegroup sysfsremovegroups deviceremoveattrs devicedel spiunregistercontroller devmspiunregister releasenodes devresreleaseall reallyprobe driverprobe_device __deviceattachdriver busforeach_drv _deviceattach deviceinitialprobe busprobedevice deferredprobeworkfunc processonework workerthread kthread retfromfork

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26866.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5314987de5e5f5e38436ef4a69328bc472bbd63e
Fixed
da83ed350e4604b976e94239b08d8e2e7eaee7ea
Fixed
1543418e82789cc383cd36d41469983c64e3fc7f
Fixed
996ce839606afd0fef91355627868022aa73eb68
Fixed
2ae0ab0143fcc06190713ed81a6486ed0ad3c861

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26866.json"