First published: Thu May 08 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: spi: spi-imx: Add check for spi_imx_setupxfer() Add check for the return value of spi_imx_setupxfer(). spi_imx->rx and spi_imx->tx function pointer can be NULL when spi_imx_setupxfer() return error, and make NULL pointer dereference. Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 Call trace: 0x0 spi_imx_pio_transfer+0x50/0xd8 spi_imx_transfer_one+0x18c/0x858 spi_transfer_one_message+0x43c/0x790 __spi_pump_transfer_message+0x238/0x5d4 __spi_sync+0x2b0/0x454 spi_write_then_read+0x11c/0x200
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-37801 is considered high due to potential NULL pointer dereference risks in the Linux kernel.
To fix CVE-2025-37801, update to the patched version of the Linux kernel that includes the necessary checks for spi_imx_setupxfer().
CVE-2025-37801 could lead to system instability or crashes if NULL function pointers are dereferenced, posing potential security risks.
Your system may be vulnerable to CVE-2025-37801 if it is running an affected version of the Linux kernel prior to the patch.
CVE-2025-37801 affects the Linux kernel, particularly implementations that utilize the spi-imx driver without the fix applied.