CVE-2026-43461 PUBLISHED

spi: amlogic: spifc-a4: Fix DMA mapping error handling

Assigner: Linux
Reserved: 01.05.2026 Published: 08.05.2026 Updated: 08.05.2026

In the Linux kernel, the following vulnerability has been resolved:

spi: amlogic: spifc-a4: Fix DMA mapping error handling

Fix three bugs in aml_sfc_dma_buffer_setup() error paths: 1. Unnecessary goto: When the first DMA mapping (sfc->daddr) fails, nothing needs cleanup. Use direct return instead of goto. 2. Double-unmap bug: When info DMA mapping failed, the code would unmap sfc->daddr inline, then fall through to out_map_data which would unmap it again, causing a double-unmap. 3. Wrong unmap size: The out_map_info label used datalen instead of infolen when unmapping sfc->iaddr, which could lead to incorrect DMA sync behavior.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 4670db6f32e9379f5ab6c9bb2a6787cd9b9230a9 to 0a83d6c9e149a176340190fa9cbadf2266db4c9a (excl.)
  • affected from 4670db6f32e9379f5ab6c9bb2a6787cd9b9230a9 to c0b88f1176074f80140ed77fce909f254b7180ab (excl.)
  • affected from 4670db6f32e9379f5ab6c9bb2a6787cd9b9230a9 to b20b437666e1cb26a7c499d1664e8f2a0ac67000 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.18 is affected
  • unaffected from 0 to 6.18 (excl.)
  • unaffected from 6.18.19 to 6.18.* (incl.)
  • unaffected from 6.19.9 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References