Описание
In the Linux kernel, the following vulnerability has been resolved:
spi-rockchip: Fix register out of bounds access
Do not write native chip select stuff for GPIO chip selects. GPIOs can be numbered much higher than native CS. Also, it makes no sense.
In the Linux kernel, the following vulnerability has been resolved:
spi-rockchip: Fix register out of bounds access
Do not write native chip select stuff for GPIO chip selects. GPIOs can be numbered much higher than native CS. Also, it makes no sense.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-38081
- https://git.kernel.org/stable/c/254e04ec799c1ff8c1e2bd08a57c6a849895d6ff
- https://git.kernel.org/stable/c/4a120221661fcecb253448d7b041a52d47f1d91f
- https://git.kernel.org/stable/c/7a874e8b54ea21094f7fd2d428b164394c6cb316
- https://git.kernel.org/stable/c/ace57bd1fb49d193edec5f6a1f255f48dd5fca90
EPSS
CVE ID
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: spi-rockchip: Fix register out of bounds access Do not write native chip select stuff for GPIO chip selects. GPIOs can be numbered much higher than native CS. Also, it makes no sense.
In the Linux kernel, the following vulnerability has been resolved: spi-rockchip: Fix register out of bounds access Do not write native chip select stuff for GPIO chip selects. GPIOs can be numbered much higher than native CS. Also, it makes no sense.
In the Linux kernel, the following vulnerability has been resolved: s ...
EPSS