CVE-2025-38573

In the Linux kernel, the following vulnerability has been resolved: spi: cs42l43: Property entry should be a null-terminated array The software node does not specify a count of property entries, so the array must be null-terminated. When unterminated, this can lead to a fault in the downstream cs35l56 amplifier driver, because the node parse walks off the end of the array into unknown memory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

26 Nov 2025, 19:59

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/139b5df757a0aa436f763b0038e0b73808d2f4b6 - () https://git.kernel.org/stable/c/139b5df757a0aa436f763b0038e0b73808d2f4b6 - Patch
References () https://git.kernel.org/stable/c/674328102baad76c7a06628efc01974ece5ae27f - () https://git.kernel.org/stable/c/674328102baad76c7a06628efc01974ece5ae27f - Patch
References () https://git.kernel.org/stable/c/9f0035ae38d2571f5ddedc829d74492013caa625 - () https://git.kernel.org/stable/c/9f0035ae38d2571f5ddedc829d74492013caa625 - Patch
References () https://git.kernel.org/stable/c/ffcfd071eec7973e58c4ffff7da4cb0e9ca7b667 - () https://git.kernel.org/stable/c/ffcfd071eec7973e58c4ffff7da4cb0e9ca7b667 - Patch
CWE NVD-CWE-Other
First Time Linux linux Kernel
Linux

Information

Published : 2025-08-19 17:15

Updated : 2025-11-26 19:59


NVD link : CVE-2025-38573

Mitre link : CVE-2025-38573

CVE.ORG link : CVE-2025-38573


JSON object : View

Products Affected

linux

  • linux_kernel