CVE-2025-39921
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.14 (inc) to 6.16.6 (exc) |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's spi-microchip-core-qspi driver. The issue arises because the function mchp_coreqspi_supports_op() incorrectly checks the viability of the op->max_freq parameter during the probe phase, when op->max_freq is actually zero and invalid. This leads to a division by zero, causing baud_rate_val to be calculated as INT_MAX, which in turn causes the probe of the attached memory device to fail. The fix involved removing this invalid check to restore the previous correct behavior.
How can this vulnerability impact me? :
This vulnerability can cause the probe of the attached memory device to fail in systems using the spi-microchip-core-qspi driver. This means that the memory device may not be properly initialized or accessible, potentially leading to device malfunction or system instability where this driver and hardware are used.