CVE-2025-21793

In the Linux kernel, the following vulnerability has been resolved: spi: sn-f-ospi: Fix division by zero When there is no dummy cycle in the spi-nor commands, both dummy bus cycle bytes and width are zero. Because of the cpu's warning when divided by zero, the warning should be avoided. Return just zero to avoid such calculations.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

05 Mar 2025, 14:05

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/966328191b4c389c0f2159fa242915f51cbc1679 - () https://git.kernel.org/stable/c/966328191b4c389c0f2159fa242915f51cbc1679 - Patch
References () https://git.kernel.org/stable/c/4df6f005bef04a3dd16c028124a1b5684db3922b - () https://git.kernel.org/stable/c/4df6f005bef04a3dd16c028124a1b5684db3922b - Patch
References () https://git.kernel.org/stable/c/3588b1c0fde2f58d166e3f94a5a58d64b893526c - () https://git.kernel.org/stable/c/3588b1c0fde2f58d166e3f94a5a58d64b893526c - Patch
References () https://git.kernel.org/stable/c/7434135553bc03809a55803ee6a8dcaae6240d55 - () https://git.kernel.org/stable/c/7434135553bc03809a55803ee6a8dcaae6240d55 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-03-05 14:57


NVD link : CVE-2025-21793

Mitre link : CVE-2025-21793


JSON object : View

Products Affected

linux

  • linux_kernel
CWE

No CWE.