CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-37801: spi: spi-imx: Add check for spi_imx_setupxfer()

Description

In the Linux kernel, the following vulnerability has been resolved:

spi: spi-imx: Add check for spi_imx_setupxfer()

Add check for the return value of spi_imx_setupxfer().
spi_imx->rx and spi_imx->tx function pointer can be NULL when
spi_imx_setupxfer() return error, and make NULL pointer dereference.

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
Call trace:
0x0
spi_imx_pio_transfer+0x50/0xd8
spi_imx_transfer_one+0x18c/0x858
spi_transfer_one_message+0x43c/0x790
__spi_pump_transfer_message+0x238/0x5d4
__spi_sync+0x2b0/0x454
spi_write_then_read+0x11c/0x200

Classification

CVE ID: CVE-2025-37801

Affected Products

Vendor: Linux

Product: Linux

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.01% (probability of being exploited)

EPSS Percentile: 1.41% (scored less or equal to compared to others)

EPSS Date: 2025-06-06 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-37801
https://git.kernel.org/stable/c/2fea0d6d7b5d27fbf55512d51851ba0a346ede52
https://git.kernel.org/stable/c/2b4479eb462ecb39001b38dfb331fc6028dedac8
https://git.kernel.org/stable/c/185d376875ea6fb4256b9dc97ee0b4d2b0fdd399
https://git.kernel.org/stable/c/055ef73bb1afc3f783a9a13b496770a781964a07
https://git.kernel.org/stable/c/951a04ab3a2db4029debfa48d380ef834b93207e

Timeline