CVE-2025-39921 — NULL Pointer Dereference in Linux
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 94.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 1
Description
In the Linux kernel, the following vulnerability has been resolved:
spi: microchip-core-qspi: stop checking viability of op->max_freq in supports_op callback
In commit 13529647743d9 ("spi: microchip-core-qspi: Support per spi-mem
operation frequency switches") the logic for checking the viability of
op->max_freq in mchp_coreqspi_setup_clock() was copied into
mchp_coreqspi_supports_op(). Unfortunately, op->max_freq is not valid
when this function is called during probe but is instead zero.
Acco…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages7 packages
▶CVEListV5linux/linux13529647743d906ed3cf991f1d77727e7ff1fb6f — ac8a13f35d5b8996582b3f97b924838a5c570c18+2
Patches
🔴Vulnerability Details
2GHSA▶
GHSA-6595-xfjg-wffj: In the Linux kernel, the following vulnerability has been resolved:
spi: microchip-core-qspi: stop checking viability of op->max_freq in supports_op↗2025-10-01
OSV▶
CVE-2025-39921: In the Linux kernel, the following vulnerability has been resolved: spi: microchip-core-qspi: stop checking viability of op->max_freq in supports_op c↗2025-10-01
📋Vendor Advisories
3Red Hat▶
kernel: spi: microchip-core-qspi: stop checking viability of op->max_freq in supports_op callback↗2025-10-01
Debian▶
CVE-2025-39921: linux - In the Linux kernel, the following vulnerability has been resolved: spi: microc...↗2025
Microsoft▶
NULL pointer exception in the Modbus dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file↗2021-11-09