CVE-2026-31439
Description
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: xilinx: xdma: Fix regmap init error handling
devm_regmap_init_mmio returns an ERR_PTR() upon error, not NULL. Fix the error check and also fix the error message. Use the error code from ERR_PTR() instead of the wrong value in ret.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel, the Xilinx DMA driver incorrectly checked the return value of devm_regmap_init_mmio, leading to improper error handling.
Vulnerability
Analysis
The vulnerability resides in the Xilinx XDMA driver within the Linux kernel. The function devm_regmap_init_mmio returns an ERR_PTR() on failure, not NULL. The original code incorrectly checked for a NULL pointer, which meant that error conditions leading to an ERR_PTR return were not properly handled. This oversight could cause the driver to proceed with an invalid regmap reference, potentially leading to undefined behavior or system instability [1].
Exploitation
Exploitation requires the ability to trigger an allocation failure within the kernel, such as by exhausting memory or malforming device initialization parameters. An attacker with local access and the capability to load or influence the Xilinx DMA driver's initialization sequence could provoke the error path. No authentication is needed beyond standard user privileges that allow interacting with the DMA subsystem [2].
Impact
If the error is not caught, the driver may use a corrupted or invalid regmap structure. This can lead to kernel memory corruption, system crashes (denial of service), or potentially privilege escalation if an attacker can control the invalid pointer to overwrite sensitive data. The CVSS v3 score of 5.5 (Medium) reflects the requirement for local access and the potential for high availability impact [3].
Mitigation
The fix involves replacing the incorrect NULL check with the proper IS_ERR() macro and using the error code from ERR_PTR() for the error message. Patches have been backported to stable kernel trees as of April 2026. Users should apply the latest stable updates from their kernel vendor [4].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- git.kernel.org/stable/c/4b6e1da50b22e5528b9003f376a3cecccce4deccnvdPatch
- git.kernel.org/stable/c/59f6ccd0f3345be2e8a78bdef2103e93f180633anvdPatch
- git.kernel.org/stable/c/9787b3d9b908785b40bc3f2e6d7082fdb8fdd98anvdPatch
- git.kernel.org/stable/c/e0adbf74e2a0455a6bc9628726ba87bcd0b42bf8nvdPatch
- git.kernel.org/stable/c/f27197ccfd2ecd2c71f27fd57c6d507e892ad24dnvdPatch
News mentions
0No linked articles in our index yet.