In the Linux kernel, the following vulnerability has been resolved:
spi: cadence: Fix out-of-bounds array access in cdns_mrvl_xspi_setup_clock()
If requested_clk > 128, cdns_mrvl_xspi_setup_clock() iterates over the
entire cdns_mrvl_xspi_clk_div_list array without breaking out early,
causing 'i' to go beyond the array bounds.
Fix that by stopping the loop when it gets to the last entry, clamping
the clock to the minimum 6.25 MHz.
Fixes the following warning with an UBSAN kernel:
vmlinux.o: warning: objtool: cdns_mrvl_xspi_setup_clock: unexpected end of section .text.cdns_mrvl_xspi_setup_clock
References
Configurations
Configuration 1 (hide)
|
History
06 May 2025, 16:40
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux linux Kernel
Linux |
|
Summary |
|
|
CWE | CWE-129 | |
References | () https://git.kernel.org/stable/c/645f1813fe0dc96381c36b834131e643b798fd73 - Patch | |
References | () https://git.kernel.org/stable/c/7ba0847fa1c22e7801cebfe5f7b75aee4fae317e - Patch | |
References | () https://git.kernel.org/stable/c/c1fb84e274cb6a2bce6ba5e65116c06e0b3ab275 - Patch | |
References | () https://git.kernel.org/stable/c/e50781bf7accc75883cb8a6a9921fb4e2fa8cca4 - Patch |
16 Apr 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-16 15:16
Updated : 2025-05-06 16:40
NVD link : CVE-2025-22067
Mitre link : CVE-2025-22067
CVE.ORG link : CVE-2025-22067
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index