CVE-2025-38081

In the Linux kernel, the following vulnerability has been resolved: spi-rockchip: Fix register out of bounds access Do not write native chip select stuff for GPIO chip selects. GPIOs can be numbered much higher than native CS. Also, it makes no sense.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Nov 2025, 20:23

Type Values Removed Values Added
CWE CWE-125
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
References () https://git.kernel.org/stable/c/254e04ec799c1ff8c1e2bd08a57c6a849895d6ff - () https://git.kernel.org/stable/c/254e04ec799c1ff8c1e2bd08a57c6a849895d6ff - Patch
References () https://git.kernel.org/stable/c/4a120221661fcecb253448d7b041a52d47f1d91f - () https://git.kernel.org/stable/c/4a120221661fcecb253448d7b041a52d47f1d91f - Patch
References () https://git.kernel.org/stable/c/7a874e8b54ea21094f7fd2d428b164394c6cb316 - () https://git.kernel.org/stable/c/7a874e8b54ea21094f7fd2d428b164394c6cb316 - Patch
References () https://git.kernel.org/stable/c/ace57bd1fb49d193edec5f6a1f255f48dd5fca90 - () https://git.kernel.org/stable/c/ace57bd1fb49d193edec5f6a1f255f48dd5fca90 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi-rockchip: Se corrige el acceso fuera de los límites al registro. No se debe escribir información de selección de chip nativa para las selecciones de chip GPIO. Las GPIO pueden tener una numeración mucho mayor que la de las CS nativas. Además, no tiene sentido.

18 Jun 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 10:15

Updated : 2025-11-14 20:23


NVD link : CVE-2025-38081

Mitre link : CVE-2025-38081

CVE.ORG link : CVE-2025-38081


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read