CVE-2025-37801

In the Linux kernel, the following vulnerability has been resolved: spi: spi-imx: Add check for spi_imx_setupxfer() Add check for the return value of spi_imx_setupxfer(). spi_imx->rx and spi_imx->tx function pointer can be NULL when spi_imx_setupxfer() return error, and make NULL pointer dereference. Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 Call trace: 0x0 spi_imx_pio_transfer+0x50/0xd8 spi_imx_transfer_one+0x18c/0x858 spi_transfer_one_message+0x43c/0x790 __spi_pump_transfer_message+0x238/0x5d4 __spi_sync+0x2b0/0x454 spi_write_then_read+0x11c/0x200
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*

History

05 Jun 2025, 14:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/055ef73bb1afc3f783a9a13b496770a781964a07 - () https://git.kernel.org/stable/c/055ef73bb1afc3f783a9a13b496770a781964a07 - Patch
References () https://git.kernel.org/stable/c/185d376875ea6fb4256b9dc97ee0b4d2b0fdd399 - () https://git.kernel.org/stable/c/185d376875ea6fb4256b9dc97ee0b4d2b0fdd399 - Patch
References () https://git.kernel.org/stable/c/2b4479eb462ecb39001b38dfb331fc6028dedac8 - () https://git.kernel.org/stable/c/2b4479eb462ecb39001b38dfb331fc6028dedac8 - Patch
References () https://git.kernel.org/stable/c/2fea0d6d7b5d27fbf55512d51851ba0a346ede52 - () https://git.kernel.org/stable/c/2fea0d6d7b5d27fbf55512d51851ba0a346ede52 - Patch
References () https://git.kernel.org/stable/c/951a04ab3a2db4029debfa48d380ef834b93207e - () https://git.kernel.org/stable/c/951a04ab3a2db4029debfa48d380ef834b93207e - Patch

08 May 2025, 14:39

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: spi-imx: Agregar verificación para spi_imx_setupxfer() Agregar verificación para el valor de retorno de spi_imx_setupxfer(). El puntero de función spi_imx->rx y spi_imx->tx puede ser NULL cuando spi_imx_setupxfer() devuelve un error y hace que el puntero se desreferencia a NULL. No se puede manejar la desreferencia del puntero NULL del kernel en la dirección virtual 0000000000000000 Rastreo de llamadas: 0x0 spi_imx_pio_transfer+0x50/0xd8 spi_imx_transfer_one+0x18c/0x858 spi_transfer_one_message+0x43c/0x790 __spi_pump_transfer_message+0x238/0x5d4 __spi_sync+0x2b0/0x454 spi_write_then_read+0x11c/0x200

08 May 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-08 07:15

Updated : 2025-06-05 14:32


NVD link : CVE-2025-37801

Mitre link : CVE-2025-37801

CVE.ORG link : CVE-2025-37801


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference