๐Ÿ” CVE Alert

CVE-2025-37801

UNKNOWN 0.0

spi: spi-imx: Add check for spi_imx_setupxfer()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: spi: spi-imx: Add check for spi_imx_setupxfer() Add check for the return value of spi_imx_setupxfer(). spi_imx->rx and spi_imx->tx function pointer can be NULL when spi_imx_setupxfer() return error, and make NULL pointer dereference. Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 Call trace: 0x0 spi_imx_pio_transfer+0x50/0xd8 spi_imx_transfer_one+0x18c/0x858 spi_transfer_one_message+0x43c/0x790 __spi_pump_transfer_message+0x238/0x5d4 __spi_sync+0x2b0/0x454 spi_write_then_read+0x11c/0x200

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 8, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
307c897db762d1e0feee9477276b08f6deca4a5b < 2fea0d6d7b5d27fbf55512d51851ba0a346ede52 307c897db762d1e0feee9477276b08f6deca4a5b < 2b4479eb462ecb39001b38dfb331fc6028dedac8 307c897db762d1e0feee9477276b08f6deca4a5b < 185d376875ea6fb4256b9dc97ee0b4d2b0fdd399 307c897db762d1e0feee9477276b08f6deca4a5b < 055ef73bb1afc3f783a9a13b496770a781964a07 307c897db762d1e0feee9477276b08f6deca4a5b < 951a04ab3a2db4029debfa48d380ef834b93207e
Linux / Linux
5.19

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/2fea0d6d7b5d27fbf55512d51851ba0a346ede52 git.kernel.org: https://git.kernel.org/stable/c/2b4479eb462ecb39001b38dfb331fc6028dedac8 git.kernel.org: https://git.kernel.org/stable/c/185d376875ea6fb4256b9dc97ee0b4d2b0fdd399 git.kernel.org: https://git.kernel.org/stable/c/055ef73bb1afc3f783a9a13b496770a781964a07 git.kernel.org: https://git.kernel.org/stable/c/951a04ab3a2db4029debfa48d380ef834b93207e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html