We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: spi: spi-imx: Add check for spi_imx_setupxfer() Add check for the return value of spi_imx_setupxfer(). spi_imx->rx and spi_imx->tx function pointer can be NULL when spi_imx_setupxfer() return error, and make NULL pointer dereference. Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 Call trace: 0x0 spi_imx_pio_transfer+0x50/0xd8 spi_imx_transfer_one+0x18c/0x858 spi_transfer_one_message+0x43c/0x790 __spi_pump_transfer_message+0x238/0x5d4 __spi_sync+0x2b0/0x454 spi_write_then_read+0x11c/0x200
Reserved 2025-04-16 | Published 2025-05-08 | Updated 2025-05-08 | Assigner Linuxgit.kernel.org/...c/2fea0d6d7b5d27fbf55512d51851ba0a346ede52
git.kernel.org/...c/2b4479eb462ecb39001b38dfb331fc6028dedac8
git.kernel.org/...c/185d376875ea6fb4256b9dc97ee0b4d2b0fdd399
git.kernel.org/...c/055ef73bb1afc3f783a9a13b496770a781964a07
git.kernel.org/...c/951a04ab3a2db4029debfa48d380ef834b93207e
Support options