Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: dmaengine: xilinx: xdma: Fix regmap init error handling devm_regmap_init_mmio returns an ERR_PTR() upon error, not NULL. Fix the error check and also fix the error message. Use the error code from ERR_PTR() instead of the wrong value in ret.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.3, < 6.6.131 |
References
- https://git.kernel.org/stable/c/4b6e1da50b22e5528b9003f376a3cecccce4deccPatch
- https://git.kernel.org/stable/c/59f6ccd0f3345be2e8a78bdef2103e93f180633aPatch
- https://git.kernel.org/stable/c/9787b3d9b908785b40bc3f2e6d7082fdb8fdd98aPatch
- https://git.kernel.org/stable/c/e0adbf74e2a0455a6bc9628726ba87bcd0b42bf8Patch
- https://git.kernel.org/stable/c/f27197ccfd2ecd2c71f27fd57c6d507e892ad24dPatch
FAQ
What is CVE-2026-31439?
CVE-2026-31439 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: dmaengine: xilinx: xdma: Fix regmap init error handling devm_regmap_init_mmio returns an ERR_PTR() upon error, not NULL. Fix the e...
How severe is CVE-2026-31439?
CVE-2026-31439 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-31439?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.