In the Linux kernel, the following vulnerability has been resolved:
spi-rockchip: Fix register out of bounds access
Do not write native chip select stuff for GPIO chip selects.
GPIOs can be numbered much higher than native CS.
Also, it makes no sense.
Metrics
Affected Vendors & Products
References
History
Fri, 14 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 | |
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 20 Jun 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 18 Jun 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: spi-rockchip: Fix register out of bounds access Do not write native chip select stuff for GPIO chip selects. GPIOs can be numbered much higher than native CS. Also, it makes no sense. | |
| Title | spi-rockchip: Fix register out of bounds access | |
| References |
|
Status: PUBLISHED
Assigner: Linux
Published: 2025-06-18T09:33:54.564Z
Updated: 2025-07-15T15:43:57.474Z
Reserved: 2025-04-16T04:51:23.981Z
Link: CVE-2025-38081
No data.
Status : Analyzed
Published: 2025-06-18T10:15:41.767
Modified: 2025-11-14T20:23:34.783
Link: CVE-2025-38081