CVE-2026-31487 PUBLISHED

spi: use generic driver_override infrastructure

Assigner: Linux
Reserved: 09.03.2026 Published: 22.04.2026 Updated: 22.04.2026

In the Linux kernel, the following vulnerability has been resolved:

spi: use generic driver_override infrastructure

When a driver is probed through __driver_attach(), the bus' match() callback is called without the device lock held, thus accessing the driver_override field without a lock, which can cause a UAF.

Fix this by using the driver-core driver_override infrastructure taking care of proper locking internally.

Note that calling match() from __driver_attach() without the device lock held is intentional. [1]

Also note that we do not enable the driver_override feature of struct bus_type, as SPI - in contrast to most other buses - passes "" to sysfs_emit() when the driver_override pointer is NULL. Thus, printing "\n" instead of "(null)\n".

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 5039563e7c25eccd7fec1de6706011009d1c5665 to eedf220442d13b6d97294e5b0ac8a2c38ee1a1a0 (excl.)
  • affected from 5039563e7c25eccd7fec1de6706011009d1c5665 to c73a58661a760373d08a6883af4f0bb5cc991a67 (excl.)
  • affected from 5039563e7c25eccd7fec1de6706011009d1c5665 to e0ae367a2de06c49aa1de6ec9b1ab6860bbb2cf0 (excl.)
  • affected from 5039563e7c25eccd7fec1de6706011009d1c5665 to cc34d77dd48708d810c12bfd6f5bf03304f6c824 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 4.20 is affected
  • unaffected from 0 to 4.20 (excl.)
  • unaffected from 6.12.80 to 6.12.* (incl.)
  • unaffected from 6.18.21 to 6.18.* (incl.)
  • unaffected from 6.19.11 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References