In the Linux kernel, the following vulnerability has been resolved:
spi: spi-imx: Add check for spi_imx_setupxfer()
Add check for the return value of spi_imx_setupxfer().
spi_imx->rx and spi_imx->tx function pointer can be NULL when
spi_imx_setupxfer() return error, and make NULL pointer dereference.
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
Call trace:
0x0
spi_imx_pio_transfer+0x50/0xd8
spi_imx_transfer_one+0x18c/0x858
spi_transfer_one_message+0x43c/0x790
__spi_pump_transfer_message+0x238/0x5d4
__spi_sync+0x2b0/0x454
spi_write_then_read+0x11c/0x200
References
Configurations
Configuration 1 (hide)
|
History
05 Jun 2025, 14:32
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-476 | |
CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/055ef73bb1afc3f783a9a13b496770a781964a07 - Patch | |
References | () https://git.kernel.org/stable/c/185d376875ea6fb4256b9dc97ee0b4d2b0fdd399 - Patch | |
References | () https://git.kernel.org/stable/c/2b4479eb462ecb39001b38dfb331fc6028dedac8 - Patch | |
References | () https://git.kernel.org/stable/c/2fea0d6d7b5d27fbf55512d51851ba0a346ede52 - Patch | |
References | () https://git.kernel.org/stable/c/951a04ab3a2db4029debfa48d380ef834b93207e - Patch |
08 May 2025, 14:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 May 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-08 07:15
Updated : 2025-06-05 14:32
NVD link : CVE-2025-37801
Mitre link : CVE-2025-37801
CVE.ORG link : CVE-2025-37801
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference