We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-37801

spi: spi-imx: Add check for spi_imx_setupxfer()



Description

In the Linux kernel, the following vulnerability has been resolved: spi: spi-imx: Add check for spi_imx_setupxfer() Add check for the return value of spi_imx_setupxfer(). spi_imx->rx and spi_imx->tx function pointer can be NULL when spi_imx_setupxfer() return error, and make NULL pointer dereference. Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 Call trace: 0x0 spi_imx_pio_transfer+0x50/0xd8 spi_imx_transfer_one+0x18c/0x858 spi_transfer_one_message+0x43c/0x790 __spi_pump_transfer_message+0x238/0x5d4 __spi_sync+0x2b0/0x454 spi_write_then_read+0x11c/0x200

Reserved 2025-04-16 | Published 2025-05-08 | Updated 2025-05-08 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 2fea0d6d7b5d27fbf55512d51851ba0a346ede52
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 2b4479eb462ecb39001b38dfb331fc6028dedac8
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 185d376875ea6fb4256b9dc97ee0b4d2b0fdd399
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 055ef73bb1afc3f783a9a13b496770a781964a07
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 951a04ab3a2db4029debfa48d380ef834b93207e
affected

Default status
affected

6.1.136
unaffected

6.6.89
unaffected

6.12.26
unaffected

6.14.5
unaffected

6.15-rc3
unaffected

References

git.kernel.org/...c/2fea0d6d7b5d27fbf55512d51851ba0a346ede52

git.kernel.org/...c/2b4479eb462ecb39001b38dfb331fc6028dedac8

git.kernel.org/...c/185d376875ea6fb4256b9dc97ee0b4d2b0fdd399

git.kernel.org/...c/055ef73bb1afc3f783a9a13b496770a781964a07

git.kernel.org/...c/951a04ab3a2db4029debfa48d380ef834b93207e

cve.org (CVE-2025-37801)

nvd.nist.gov (CVE-2025-37801)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-37801

Support options

Helpdesk Chat, Email, Knowledgebase