CVE-2025-39921
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
01/10/2025
Última modificación:
14/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
spi: microchip-core-qspi: stop checking viability of op->max_freq in supports_op callback<br />
<br />
In commit 13529647743d9 ("spi: microchip-core-qspi: Support per spi-mem<br />
operation frequency switches") the logic for checking the viability of<br />
op->max_freq in mchp_coreqspi_setup_clock() was copied into<br />
mchp_coreqspi_supports_op(). Unfortunately, op->max_freq is not valid<br />
when this function is called during probe but is instead zero.<br />
Accordingly, baud_rate_val is calculated to be INT_MAX due to division<br />
by zero, causing probe of the attached memory device to fail.<br />
<br />
Seemingly spi-microchip-core-qspi was the only driver that had such a<br />
modification made to its supports_op callback when the per_op_freq<br />
capability was added, so just remove it to restore prior functionality.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (incluyendo) | 6.16.6 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



