{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-26866","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-19T14:20:24.184Z","datePublished":"2024-04-17T10:27:28.163Z","dateUpdated":"2025-05-04T08:58:24.427Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T08:58:24.427Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nspi: lpspi: Avoid potential use-after-free in probe()\n\nfsl_lpspi_probe() is allocating/disposing memory manually with\nspi_alloc_host()/spi_alloc_target(), but uses\ndevm_spi_register_controller(). In case of error after the latter call the\nmemory will be explicitly freed in the probe function by\nspi_controller_put() call, but used afterwards by \"devm\" management outside\nprobe() (spi_unregister_controller() <- devm_spi_unregister() below).\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000070\n...\nCall trace:\n kernfs_find_ns\n kernfs_find_and_get_ns\n sysfs_remove_group\n sysfs_remove_groups\n device_remove_attrs\n device_del\n spi_unregister_controller\n devm_spi_unregister\n release_nodes\n devres_release_all\n really_probe\n driver_probe_device\n __device_attach_driver\n bus_for_each_drv\n __device_attach\n device_initial_probe\n bus_probe_device\n deferred_probe_work_func\n process_one_work\n worker_thread\n kthread\n ret_from_fork"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/spi/spi-fsl-lpspi.c"],"versions":[{"version":"5314987de5e5f5e38436ef4a69328bc472bbd63e","lessThan":"da83ed350e4604b976e94239b08d8e2e7eaee7ea","status":"affected","versionType":"git"},{"version":"5314987de5e5f5e38436ef4a69328bc472bbd63e","lessThan":"1543418e82789cc383cd36d41469983c64e3fc7f","status":"affected","versionType":"git"},{"version":"5314987de5e5f5e38436ef4a69328bc472bbd63e","lessThan":"996ce839606afd0fef91355627868022aa73eb68","status":"affected","versionType":"git"},{"version":"5314987de5e5f5e38436ef4a69328bc472bbd63e","lessThan":"2ae0ab0143fcc06190713ed81a6486ed0ad3c861","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/spi/spi-fsl-lpspi.c"],"versions":[{"version":"4.10","status":"affected"},{"version":"0","lessThan":"4.10","status":"unaffected","versionType":"semver"},{"version":"6.6.23","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.11","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8.2","lessThanOrEqual":"6.8.*","status":"unaffected","versionType":"semver"},{"version":"6.9","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"6.6.23"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"6.7.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"6.8.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"6.9"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/da83ed350e4604b976e94239b08d8e2e7eaee7ea"},{"url":"https://git.kernel.org/stable/c/1543418e82789cc383cd36d41469983c64e3fc7f"},{"url":"https://git.kernel.org/stable/c/996ce839606afd0fef91355627868022aa73eb68"},{"url":"https://git.kernel.org/stable/c/2ae0ab0143fcc06190713ed81a6486ed0ad3c861"}],"title":"spi: lpspi: Avoid potential use-after-free in probe()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-26866","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-05-28T19:57:41.631957Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:49:35.428Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T00:21:04.255Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/da83ed350e4604b976e94239b08d8e2e7eaee7ea","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/1543418e82789cc383cd36d41469983c64e3fc7f","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/996ce839606afd0fef91355627868022aa73eb68","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/2ae0ab0143fcc06190713ed81a6486ed0ad3c861","tags":["x_transferred"]}]}]}}