CVE-2025-37801
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
08/05/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
spi: spi-imx: Add check for spi_imx_setupxfer()<br />
<br />
Add check for the return value of spi_imx_setupxfer().<br />
spi_imx->rx and spi_imx->tx function pointer can be NULL when<br />
spi_imx_setupxfer() return error, and make NULL pointer dereference.<br />
<br />
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000<br />
Call trace:<br />
0x0<br />
spi_imx_pio_transfer+0x50/0xd8<br />
spi_imx_transfer_one+0x18c/0x858<br />
spi_transfer_one_message+0x43c/0x790<br />
__spi_pump_transfer_message+0x238/0x5d4<br />
__spi_sync+0x2b0/0x454<br />
spi_write_then_read+0x11c/0x200
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.136 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.89 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.26 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/055ef73bb1afc3f783a9a13b496770a781964a07
- https://git.kernel.org/stable/c/185d376875ea6fb4256b9dc97ee0b4d2b0fdd399
- https://git.kernel.org/stable/c/2b4479eb462ecb39001b38dfb331fc6028dedac8
- https://git.kernel.org/stable/c/2fea0d6d7b5d27fbf55512d51851ba0a346ede52
- https://git.kernel.org/stable/c/951a04ab3a2db4029debfa48d380ef834b93207e
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



