Description
In the Linux kernel, the following vulnerability has been resolved:

spi: spi-dw-dma: fix print error log when wait finish transaction

If an error occurs, the device may not have a current message. In this
case, the system will crash.

In this case, it's better to use dev from the struct ctlr (struct spi_controller*).
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (kernel crash)
Action: Apply patch
AI Analysis

Impact

A null pointer dereference can occur in the SPI DMA driver when an error is generated and the device has no current message. The kernel attempts to log the error incorrectly, resulting in an unexpected crash that may bring the entire system down. This flaw is identified as CWE-476 and NVD-CWE-noinfo and would allow an attacker who can trigger such a driver error to cause a denial‑of‑service condition. The vulnerability is not tied to a remote payload; it requires local or privileged code to exercise the driver error path.

Affected Systems

The flaw exists in the Linux kernel for version 5.8 and all release candidates of version 7.0 (rc1 through rc7) as well as any general kernel builds that include the spi-dw-dma driver without the patch. Administrators using these kernel versions should check whether the spi-dw-dma subsystem is active on the system.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1% shows that the exploitation probability is low at present. Because the issue leads to a kernel crash, it is considered a local or privileged threat: an attacker must be able to provoke the driver error on the affected machine. The vulnerability is not listed in the CISA KEV catalog, suggesting that no widespread, actively exploited variants are known.

Generated by OpenCVE AI on April 28, 2026 at 14:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that incorporates the fix for the spi-dw-dma driver, such as Linux kernel 5.8.x with patch applied or any kernel 7.0 alpha/beta/rc release that includes the commit that corrects the error‑log path.
  • If an immediate kernel upgrade is not possible, disable the spi-dw-dma driver or remove the hardware device from the system to prevent the error condition from occurring.
  • Verify that any custom or vendor‑supplied kernel builds include the upstream patch before deploying them to production environments.

Generated by OpenCVE AI on April 28, 2026 at 14:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:5.8:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Sat, 25 Apr 2026 00:15:00 +0000


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: spi: spi-dw-dma: fix print error log when wait finish transaction If an error occurs, the device may not have a current message. In this case, the system will crash. In this case, it's better to use dev from the struct ctlr (struct spi_controller*).
Title spi: spi-dw-dma: fix print error log when wait finish transaction
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:11:08.845Z

Reserved: 2026-03-09T15:48:24.116Z

Link: CVE-2026-31560

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:30.403

Modified: 2026-04-27T20:30:03.137

Link: CVE-2026-31560

cve-icon Redhat

Severity :

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31560 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:15:34Z

Weaknesses