CVE-2026-43462
Memory Leak in Spacemit Linux Kernel Network Driver
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's network subsystem, specifically in the spacemit component. It involves improper error handling in the function emac_tx_mem_map(). When an error occurs during DMA (Direct Memory Access) mapping, the allocated DMA mappings were not properly released, causing a resource leak. The fix involves freeing these DMA mappings using the existing emac_free_tx_buf() function to prevent the leak.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily related to resource leakage in the Linux kernel's network subsystem. If DMA mappings are leaked due to improper error handling, it can lead to increased memory usage and potentially degrade system performance or stability over time. In severe cases, this could cause system crashes or denial of service if resources are exhausted.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability in the Linux kernel related to DMA mappings being leaked on mapping error has been fixed by correcting error handling in the emac_tx_mem_map() function.
To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.