Impact
The vulnerability arises from the Xilinx XDMA DMA engine driver incorrectly handling the return value of a regmap initialization function; the code treats a ERR_PTR error as a NULL pointer, allowing the driver to proceed with an invalid regmap. This oversight can lead to kernel crashes or memory corruption, compromising system stability but not exposing data or enabling remote code execution.
Affected Systems
All Linux kernel releases that incorporate the Xilinx XDMA driver before the fix was applied are affected. The patch was merged into stable kernel branches in early 2026, and the affected range includes kernels from the 7.0 release series (rc1 through rc6) and earlier stable releases that contain the unpatched driver.
Risk and Exploitability
The EPSS score is below 1 % and the CVSS score is 5.5, indicating a moderate severity but low likelihood of exploitation. Because the flaw resides in kernel‑mode code that requires the driver to be loaded or the associated hardware to be accessed, the attack vector is inferred to be local or dependent on interaction with Xilinx XDMA hardware; this inference is not explicitly stated in the CVE data. The vulnerability is not listed in the CISA KEV catalog, further reducing the expected threat level. Overall risk is limited to potential system instability or denial of service when the DMA hardware is used.
OpenCVE Enrichment
Debian DSA