In the Linux kernel, the following vulnerability has been resolved:
spi: spi-imx: Add check for spi_imx_setupxfer()
Add check for the return value of spi_imx_setupxfer().
spi_imx->rx and spi_imx->tx function pointer can be NULL when
spi_imx_setupxfer() return error, and make NULL pointer dereference.
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
Call trace:
0x0
spi_imx_pio_transfer+0x50/0xd8
spi_imx_transfer_one+0x18c/0x858
spi_transfer_one_message+0x43c/0x790
__spi_pump_transfer_message+0x238/0x5d4
__spi_sync+0x2b0/0x454
spi_write_then_read+0x11c/0x200
References
Configurations
Configuration 1 (hide)
|
History
05 Jun 2025, 14:32
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-08 07:15
Updated : 2025-06-05 14:32
NVD link : CVE-2025-37801
Mitre link : CVE-2025-37801
CVE.ORG link : CVE-2025-37801
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference