Description
In the Linux kernel, the following vulnerability has been resolved:

spi: rockchip-sfc: Fix double-free in remove() callback

The driver uses devm_spi_register_controller() for registration, which
automatically unregisters the controller via devm cleanup when the
device is removed. The manual call to spi_unregister_controller() in
the remove() callback can lead to a double-free.

And to make sure controller is unregistered before DMA buffer is
unmapped, switch to use spi_register_controller() in probe().
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel rockchip‑sfc SPI controller driver registers its controller with devm_spi_register_controller(), which automatically unregisters the controller during device removal. The driver also calls spi_unregister_controller() in its remove() callback, causing a second free of the same controller object. This double‑free corrupts kernel memory and can potentially allow an attacker to execute arbitrary code or privilege‑escalate in the kernel.

Affected Systems

Linux kernel versions that include the rockchip‑sfc driver before the fix commit (e.g., commit 111e2863) and running on Rockchip SoCs are affected. All kernel builds lacking that commit, regardless of distribution, are vulnerable; the flaw is confined to the rockchip‑sfc driver and does not impact other modules.

Risk and Exploitability

Due to the missing CVSS score, the EPSS score is reported as <1% and the flaw is not listed in the CISA KEV catalog. The double‑free occurs during device removal, so an attacker would need to trigger removal of the rockchip‑sfc controller, which typically requires local privileged access or the ability to interact with the device. The likely attack vector is local hardware or system control that can force driver removal. Although exploitation probability is low, the nature of the bug indicates high severity and the possibility of kernel memory corruption leading to privilege escalation.

Generated by OpenCVE AI on May 9, 2026 at 16:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that contains commit 111e2863, which removes the double‑free bug and uses spi_register_controller() during probe().
  • If an upgrade cannot be applied immediately, unload or disable the rockchip_sfc kernel module at runtime with "modprobe -r rockchip_sfc" or by disabling the driver in the kernel configuration.
  • For custom kernel builds that include the affected driver code, edit the source to remove or comment out the manual spi_unregister_controller() call in the remove() callback and rely on the devm cleanup mechanism.

Generated by OpenCVE AI on May 9, 2026 at 16:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Sat, 09 May 2026 12:15:00 +0000


Fri, 08 May 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: spi: rockchip-sfc: Fix double-free in remove() callback The driver uses devm_spi_register_controller() for registration, which automatically unregisters the controller via devm cleanup when the device is removed. The manual call to spi_unregister_controller() in the remove() callback can lead to a double-free. And to make sure controller is unregistered before DMA buffer is unmapped, switch to use spi_register_controller() in probe().
Title spi: rockchip-sfc: Fix double-free in remove() callback
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:22:23.332Z

Reserved: 2026-05-01T14:12:56.010Z

Link: CVE-2026-43460

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:58.880

Modified: 2026-05-08T15:16:58.880

Link: CVE-2026-43460

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43460 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T16:30:37Z

Weaknesses