First published: Fri Apr 18 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() If speed_hz < AMD_SPI_MIN_HZ, amd_set_spi_freq() iterates over the entire amd_spi_freq array without breaking out early, causing 'i' to go beyond the array bounds. Fix that by stopping the loop when it gets to the last entry, so the low speed_hz value gets clamped up to AMD_SPI_MIN_HZ. Fixes the following warning with an UBSAN kernel: drivers/spi/spi-amd.o: error: objtool: amd_set_spi_freq() falls through to next function amd_spi_set_opcode()
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-40014 is classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2025-40014, upgrade to the latest version of the Linux kernel that includes the patch addressing this vulnerability.
CVE-2025-40014 is caused by an out-of-bounds stack access in the amd_set_spi_freq() function when speed_hz is below AMD_SPI_MIN_HZ.
CVE-2025-40014 affects certain versions of the Linux kernel that contain the vulnerable implementation of amd_set_spi_freq().
CVE-2025-40014 is not a remote exploit; it requires local access to the system to be leveraged.