CVE-2026-31485 PUBLISHED

spi: spi-fsl-lpspi: fix teardown order issue (UAF)

Assigner: Linux
Reserved: 09.03.2026 Published: 22.04.2026 Updated: 22.04.2026

In the Linux kernel, the following vulnerability has been resolved:

spi: spi-fsl-lpspi: fix teardown order issue (UAF)

There is a teardown order issue in the driver. The SPI controller is registered using devm_spi_register_controller(), which delays unregistration of the SPI controller until after the fsl_lpspi_remove() function returns.

As the fsl_lpspi_remove() function synchronously tears down the DMA channels, a running SPI transfer triggers the following NULL pointer dereference due to use after free:

| fsl_lpspi 42550000.spi: I/O Error in DMA RX | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 [...] | Call trace: | fsl_lpspi_dma_transfer+0x260/0x340 [spi_fsl_lpspi] | fsl_lpspi_transfer_one+0x198/0x448 [spi_fsl_lpspi] | spi_transfer_one_message+0x49c/0x7c8 | __spi_pump_transfer_message+0x120/0x420 | __spi_sync+0x2c4/0x520 | spi_sync+0x34/0x60 | spidev_message+0x20c/0x378 [spidev] | spidev_ioctl+0x398/0x750 [spidev] [...]

Switch from devm_spi_register_controller() to spi_register_controller() in fsl_lpspi_probe() and add the corresponding spi_unregister_controller() in fsl_lpspi_remove().

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 5314987de5e5f5e38436ef4a69328bc472bbd63e to fbe6f40caeebb0b1ea9dfedc259124c1d3cda7a6 (excl.)
  • affected from 5314987de5e5f5e38436ef4a69328bc472bbd63e to ca4483f36ac1b62e69f8b182c5b8f059e0abecfb (excl.)
  • affected from 5314987de5e5f5e38436ef4a69328bc472bbd63e to e3fd54f8b0317fbccc103961ddd660f2a32dcf0b (excl.)
  • affected from 5314987de5e5f5e38436ef4a69328bc472bbd63e to adb25339b66112393fd6892ceff926765feb5b86 (excl.)
  • affected from 5314987de5e5f5e38436ef4a69328bc472bbd63e to d5d01f24bc6fbde40b4e567ef9160194b61267bc (excl.)
  • affected from 5314987de5e5f5e38436ef4a69328bc472bbd63e to e89e2b97253c124d37bf88e96e5e8ce5c3aeeec3 (excl.)
  • affected from 5314987de5e5f5e38436ef4a69328bc472bbd63e to 15650dfbaeeb14bcaaf053b93cf631db8d465300 (excl.)
  • affected from 5314987de5e5f5e38436ef4a69328bc472bbd63e to b341c1176f2e001b3adf0b47154fc31589f7410e (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 4.10 is affected
  • unaffected from 0 to 4.10 (excl.)
  • unaffected from 5.10.253 to 5.10.* (incl.)
  • unaffected from 5.15.203 to 5.15.* (incl.)
  • unaffected from 6.1.168 to 6.1.* (incl.)
  • unaffected from 6.6.131 to 6.6.* (incl.)
  • unaffected from 6.12.80 to 6.12.* (incl.)
  • unaffected from 6.18.21 to 6.18.* (incl.)
  • unaffected from 6.19.11 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References