{"id":"CVE-2026-23068","summary":"spi: spi-sprd-adi: Fix double free in probe error path","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-sprd-adi: Fix double free in probe error path\n\nThe driver currently uses spi_alloc_host() to allocate the controller\nbut registers it using devm_spi_register_controller().\n\nIf devm_register_restart_handler() fails, the code jumps to the\nput_ctlr label and calls spi_controller_put(). However, since the\ncontroller was registered via a devm function, the device core will\nautomatically call spi_controller_put() again when the probe fails.\nThis results in a double-free of the spi_controller structure.\n\nFix this by switching to devm_spi_alloc_host() and removing the\nmanual spi_controller_put() call.","modified":"2026-04-02T17:29:27.402060Z","published":"2026-02-04T16:07:49.119Z","related":["SUSE-SU-2026:0962-1","SUSE-SU-2026:1081-1","SUSE-SU-2026:20667-1","SUSE-SU-2026:20720-1","SUSE-SU-2026:20838-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","SUSE-SU-2026:20931-1","openSUSE-SU-2026:20416-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23068.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/346775f2b4cf839177e8e86b94aa180a06dc15b0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/383d4f5cffcc8df930d95b06518a9d25a6d74aac"},{"type":"WEB","url":"https://git.kernel.org/stable/c/417cdfd9b9f986e95bfcb1d68eb443e6e0a15f8c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bddd3d10d039729b81cfb0804520c8832a701a0e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f6d6b3f172df118db582fe5ec43ae223a55d99cf"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23068.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23068"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ac1775012058e13ef1522938e27f5973d9e3f053"},{"fixed":"bddd3d10d039729b81cfb0804520c8832a701a0e"},{"fixed":"417cdfd9b9f986e95bfcb1d68eb443e6e0a15f8c"},{"fixed":"346775f2b4cf839177e8e86b94aa180a06dc15b0"},{"fixed":"f6d6b3f172df118db582fe5ec43ae223a55d99cf"},{"fixed":"383d4f5cffcc8df930d95b06518a9d25a6d74aac"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23068.json"}}],"schema_version":"1.7.5"}