Home

Description

In the Linux kernel, the following vulnerability has been resolved: spi: spi-dw-dma: fix print error log when wait finish transaction If an error occurs, the device may not have a current message. In this case, the system will crash. In this case, it's better to use dev from the struct ctlr (struct spi_controller*).

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-25 | Assigner Linux

Product status

Default status
unaffected

bdbdf0f06337d3661b64c0288c291cb06624065e (git) before 184f5aaf72f1f1c73e66bae0b8d28e81c2f2a72f
affected

bdbdf0f06337d3661b64c0288c291cb06624065e (git) before 3b46d61890632c8f8b117147b6923bff4b42ccb7
affected

Default status
affected

5.8
affected

Any version before 5.8
unaffected

6.19.11 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/184f5aaf72f1f1c73e66bae0b8d28e81c2f2a72f

git.kernel.org/...c/3b46d61890632c8f8b117147b6923bff4b42ccb7

cve.org (CVE-2026-31560)

nvd.nist.gov (CVE-2026-31560)

Download JSON