Description
In the Linux kernel, the following vulnerability has been resolved:

spi: amlogic-spisg: Fix memory leak in aml_spisg_probe()

In aml_spisg_probe(), ctlr is allocated by
spi_alloc_target()/spi_alloc_host(), but fails to call
spi_controller_put() in several error paths. This leads
to a memory leak whenever the driver fails to probe after
the initial allocation.

Convert to use devm_spi_alloc_host()/devm_spi_alloc_target()
to fix the memory leak.
Published: 2026-04-03
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via resource exhaustion
Action: Immediate Patch
AI Analysis

Impact

The amlogic-spisg driver in the Linux kernel contains a memory leak in its probe routine because a controller allocation is not released when probe errors occur. Each time the driver fails to initialize, the allocated memory remains in kernel space, leading to a gradual depletion of available memory. Although the defect does not provide a direct path to remote code execution or privilege escalation, repeated probe failures can destabilize the system or cause a denial of service through exhaustion of kernel memory resources.

Affected Systems

All Linux kernel releases that include the amlogic-spisg driver before the patch that replaced aml_spisg_probe() with devm-managed allocations are affected. The advisory does not list exact version numbers; administrators should check whether their kernel contains the upstream commit that introduces the devm_spi_alloc_* calls. The vulnerability is therefore present in any kernel build that has not incorporated this change.

Risk and Exploitability

The CVSS score is not supplied and EPSS data is unavailable, indicating limited publicly known exploitation. The bug is not listed in the CISA KEV catalog. Exploitation requires the ability to trigger repeated probe failures, which generally implies local control or the capability to influence device initialization. Consequently the risk profile is moderate, primarily representing a local denial-of-service scenario rather than a remote attack vector.

Generated by OpenCVE AI on April 3, 2026 at 18:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the recent commits to amlogic-spisg.
  • If a patch is not yet available, blacklist or disable the amlogic-spisg driver until the update can be applied.
  • Monitor kernel logs for spisg probe failures and track memory usage to detect early signs of resource exhaustion.

Generated by OpenCVE AI on April 3, 2026 at 18:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: spi: amlogic-spisg: Fix memory leak in aml_spisg_probe() In aml_spisg_probe(), ctlr is allocated by spi_alloc_target()/spi_alloc_host(), but fails to call spi_controller_put() in several error paths. This leads to a memory leak whenever the driver fails to probe after the initial allocation. Convert to use devm_spi_alloc_host()/devm_spi_alloc_target() to fix the memory leak.
Title spi: amlogic-spisg: Fix memory leak in aml_spisg_probe()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T15:15:17.355Z

Reserved: 2026-01-13T15:37:46.016Z

Link: CVE-2026-23431

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:24.493

Modified: 2026-04-03T16:16:24.493

Link: CVE-2026-23431

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23431 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:16:20Z

Weaknesses