Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: spi: cs42l43: Property entry should be a null-terminated array The software node does not specify a count of property entries, so the array must be null-terminated. When unterminated, this can lead to a fault in the downstream cs35l56 amplifier driver, because the node parse walks off the end of the array into unknown memory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.11, < 6.12.42 |
References
- https://git.kernel.org/stable/c/139b5df757a0aa436f763b0038e0b73808d2f4b6Patch
- https://git.kernel.org/stable/c/674328102baad76c7a06628efc01974ece5ae27fPatch
- https://git.kernel.org/stable/c/9f0035ae38d2571f5ddedc829d74492013caa625Patch
- https://git.kernel.org/stable/c/ffcfd071eec7973e58c4ffff7da4cb0e9ca7b667Patch
FAQ
What is CVE-2025-38573?
CVE-2025-38573 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: spi: cs42l43: Property entry should be a null-terminated array The software node does not specify a count of property entries, so ...
How severe is CVE-2025-38573?
CVE-2025-38573 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-38573?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.