CVE-2025-38573

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38573
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38573.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38573
Downstream
Published
2025-08-19T17:02:53.008Z
Modified
2025-11-27T12:54:52.910734Z
Summary
spi: cs42l43: Property entry should be a null-terminated array
Details

In the Linux kernel, the following vulnerability has been resolved:

spi: cs42l43: Property entry should be a null-terminated array

The software node does not specify a count of property entries, so the array must be null-terminated.

When unterminated, this can lead to a fault in the downstream cs35l56 amplifier driver, because the node parse walks off the end of the array into unknown memory.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/cc431b3424123d84bcd7afd4de150b33f117a8ef/cves/2025/38xxx/CVE-2025-38573.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0ca645ab5b1528666f6662a0e620140355b5aea3
Fixed
674328102baad76c7a06628efc01974ece5ae27f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0ca645ab5b1528666f6662a0e620140355b5aea3
Fixed
9f0035ae38d2571f5ddedc829d74492013caa625
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0ca645ab5b1528666f6662a0e620140355b5aea3
Fixed
139b5df757a0aa436f763b0038e0b73808d2f4b6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0ca645ab5b1528666f6662a0e620140355b5aea3
Fixed
ffcfd071eec7973e58c4ffff7da4cb0e9ca7b667

Affected versions

v6.*

v6.10
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.10
v6.12.11
v6.12.12
v6.12.13
v6.12.14
v6.12.15
v6.12.16
v6.12.17
v6.12.18
v6.12.19
v6.12.2
v6.12.20
v6.12.21
v6.12.22
v6.12.23
v6.12.24
v6.12.25
v6.12.26
v6.12.27
v6.12.28
v6.12.29
v6.12.3
v6.12.30
v6.12.31
v6.12.32
v6.12.33
v6.12.34
v6.12.35
v6.12.36
v6.12.37
v6.12.38
v6.12.39
v6.12.4
v6.12.40
v6.12.41
v6.12.5
v6.12.6
v6.12.7
v6.12.8
v6.12.9
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.15
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.15.1
v6.15.2
v6.15.3
v6.15.4
v6.15.5
v6.15.6
v6.15.7
v6.15.8
v6.15.9
v6.16
v6.16-rc1
v6.16-rc2
v6.16-rc3
v6.16-rc4
v6.16-rc5
v6.16-rc6
v6.16-rc7

Database specific

vanir_signatures

[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ffcfd071eec7973e58c4ffff7da4cb0e9ca7b667",
        "deprecated": false,
        "signature_type": "Line",
        "id": "CVE-2025-38573-6bc99428",
        "target": {
            "file": "drivers/spi/spi-cs42l43.c"
        },
        "digest": {
            "line_hashes": [
                "85696440487582173616552622727841444794",
                "6160248363928552774586277454783071127",
                "80611815404687391292209848339969580556",
                "225044949120024921019853608363219948774"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f0035ae38d2571f5ddedc829d74492013caa625",
        "deprecated": false,
        "signature_type": "Line",
        "id": "CVE-2025-38573-70e7d1e4",
        "target": {
            "file": "drivers/spi/spi-cs42l43.c"
        },
        "digest": {
            "line_hashes": [
                "85696440487582173616552622727841444794",
                "6160248363928552774586277454783071127",
                "80611815404687391292209848339969580556",
                "225044949120024921019853608363219948774"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@674328102baad76c7a06628efc01974ece5ae27f",
        "deprecated": false,
        "signature_type": "Line",
        "id": "CVE-2025-38573-a1392629",
        "target": {
            "file": "drivers/spi/spi-cs42l43.c"
        },
        "digest": {
            "line_hashes": [
                "85696440487582173616552622727841444794",
                "6160248363928552774586277454783071127",
                "80611815404687391292209848339969580556",
                "225044949120024921019853608363219948774"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@139b5df757a0aa436f763b0038e0b73808d2f4b6",
        "deprecated": false,
        "signature_type": "Line",
        "id": "CVE-2025-38573-a90377dd",
        "target": {
            "file": "drivers/spi/spi-cs42l43.c"
        },
        "digest": {
            "line_hashes": [
                "85696440487582173616552622727841444794",
                "6160248363928552774586277454783071127",
                "80611815404687391292209848339969580556",
                "225044949120024921019853608363219948774"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.11.0
Fixed
6.12.42
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.10
Type
ECOSYSTEM
Events
Introduced
6.16.0
Fixed
6.16.1