In the Linux kernel, the following vulnerability has been resolved:
spi-rockchip: Fix register out of bounds access
Do not write native chip select stuff for GPIO chip selects.
GPIOs can be numbered much higher than native CS.
Also, it makes no sense.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Jun 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 18 Jun 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: spi-rockchip: Fix register out of bounds access Do not write native chip select stuff for GPIO chip selects. GPIOs can be numbered much higher than native CS. Also, it makes no sense. | |
Title | spi-rockchip: Fix register out of bounds access | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-06-18T09:33:54.564Z
Updated: 2025-07-15T15:43:57.474Z
Reserved: 2025-04-16T04:51:23.981Z
Link: CVE-2025-38081

No data.

Status : Awaiting Analysis
Published: 2025-06-18T10:15:41.767
Modified: 2025-06-18T13:46:52.973
Link: CVE-2025-38081
