In the Linux kernel, the following vulnerability has been resolved:
spi-rockchip: Fix register out of bounds access
Do not write native chip select stuff for GPIO chip selects. GPIOs can be numbered much higher than native CS. Also, it makes no sense.
[
{
"digest": {
"length": 2037.0,
"function_hash": "155971588021888283534618558842454118016"
},
"target": {
"function": "rockchip_spi_config",
"file": "drivers/spi/spi-rockchip.c"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7a874e8b54ea21094f7fd2d428b164394c6cb316",
"id": "CVE-2025-38081-06f9b328"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"28337139037392333056862393234703126567",
"21869928236576392149244273180425447431",
"39784661331010375692540323243438871174",
"62411658519468572345200190461337250854"
]
},
"target": {
"file": "drivers/spi/spi-rockchip.c"
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7a874e8b54ea21094f7fd2d428b164394c6cb316",
"id": "CVE-2025-38081-7a2d79e7"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"28337139037392333056862393234703126567",
"21869928236576392149244273180425447431",
"39784661331010375692540323243438871174",
"62411658519468572345200190461337250854"
]
},
"target": {
"file": "drivers/spi/spi-rockchip.c"
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@254e04ec799c1ff8c1e2bd08a57c6a849895d6ff",
"id": "CVE-2025-38081-9ad7b6d0"
},
{
"digest": {
"length": 2037.0,
"function_hash": "155971588021888283534618558842454118016"
},
"target": {
"function": "rockchip_spi_config",
"file": "drivers/spi/spi-rockchip.c"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ace57bd1fb49d193edec5f6a1f255f48dd5fca90",
"id": "CVE-2025-38081-a58adbbf"
},
{
"digest": {
"length": 2037.0,
"function_hash": "155971588021888283534618558842454118016"
},
"target": {
"function": "rockchip_spi_config",
"file": "drivers/spi/spi-rockchip.c"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4a120221661fcecb253448d7b041a52d47f1d91f",
"id": "CVE-2025-38081-b5bbc96f"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"28337139037392333056862393234703126567",
"21869928236576392149244273180425447431",
"39784661331010375692540323243438871174",
"62411658519468572345200190461337250854"
]
},
"target": {
"file": "drivers/spi/spi-rockchip.c"
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4a120221661fcecb253448d7b041a52d47f1d91f",
"id": "CVE-2025-38081-e41fed87"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"28337139037392333056862393234703126567",
"21869928236576392149244273180425447431",
"39784661331010375692540323243438871174",
"62411658519468572345200190461337250854"
]
},
"target": {
"file": "drivers/spi/spi-rockchip.c"
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ace57bd1fb49d193edec5f6a1f255f48dd5fca90",
"id": "CVE-2025-38081-eb71ab06"
},
{
"digest": {
"length": 2037.0,
"function_hash": "155971588021888283534618558842454118016"
},
"target": {
"function": "rockchip_spi_config",
"file": "drivers/spi/spi-rockchip.c"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@254e04ec799c1ff8c1e2bd08a57c6a849895d6ff",
"id": "CVE-2025-38081-ebdf73b1"
}
]