Description
In the Linux kernel, the following vulnerability has been resolved:

spi: amlogic: spifc-a4: Fix DMA mapping error handling

Fix three bugs in aml_sfc_dma_buffer_setup() error paths:
1. Unnecessary goto: When the first DMA mapping (sfc->daddr) fails,
nothing needs cleanup. Use direct return instead of goto.
2. Double-unmap bug: When info DMA mapping failed, the code would
unmap sfc->daddr inline, then fall through to out_map_data which
would unmap it again, causing a double-unmap.
3. Wrong unmap size: The out_map_info label used datalen instead of
infolen when unmapping sfc->iaddr, which could lead to incorrect
DMA sync behavior.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw lies in the Amlogic spifc‑a4 SPI flash controller driver in the Linux kernel. Three separate bugs were identified in the DMA buffer setup routine: an unnecessary jump that pretends to perform cleanup when the first DMA mapping fails, a double‑unmap that can corrupt kernel memory, and an incorrect unmap size that can cause improper synchronization. It is inferred that if the DMA mapping fails, the double‑unmap and incorrect unmap size can lead to a kernel panic or memory corruption, thereby causing a denial‑of‑service scenario when an attacker induces such a failure.

Affected Systems

All Linux kernel releases that contain the unpatched spifc‑a4 driver are affected; this includes embedded devices, single‑board computers, and other systems powered by Amlogic SoCs that use the driver. The precise kernel versions are those before the patch commits referenced in the advisory. Devices runing those kernel builds are at risk until the update is applied.

Risk and Exploitability

No CVSS score is disclosed and the EPSS score is less than 1%, indicating a very low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. The risk is local and manifests when a DMA mapping error occurs; an attacker would need to trigger that failure, which may require local or privileged access to the device. The potential impact is severe kernel memory corruption or a crash, resulting in a denial of service for the affected host.

Generated by OpenCVE AI on May 9, 2026 at 16:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a build that includes the spifc‑a4 DMA mapping fix referenced in the commit logs.
  • Reboot or reload the driver after applying the patch so the corrected logic takes effect.
  • If the Amlogic SPI controller is not required, unload or disable the spifc‑a4 driver to avoid the issue until a permanent patch is available.

Generated by OpenCVE AI on May 9, 2026 at 16:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-122
CWE-415

Sat, 09 May 2026 12:15:00 +0000


Fri, 08 May 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-122
CWE-415

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: spi: amlogic: spifc-a4: Fix DMA mapping error handling Fix three bugs in aml_sfc_dma_buffer_setup() error paths: 1. Unnecessary goto: When the first DMA mapping (sfc->daddr) fails, nothing needs cleanup. Use direct return instead of goto. 2. Double-unmap bug: When info DMA mapping failed, the code would unmap sfc->daddr inline, then fall through to out_map_data which would unmap it again, causing a double-unmap. 3. Wrong unmap size: The out_map_info label used datalen instead of infolen when unmapping sfc->iaddr, which could lead to incorrect DMA sync behavior.
Title spi: amlogic: spifc-a4: Fix DMA mapping error handling
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:22:23.999Z

Reserved: 2026-05-01T14:12:56.010Z

Link: CVE-2026-43461

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:58.977

Modified: 2026-05-08T15:16:58.977

Link: CVE-2026-43461

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43461 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T16:30:37Z

Weaknesses