In the Linux kernel, the following vulnerability has been resolved:
spi: sn-f-ospi: Fix division by zero
When there is no dummy cycle in the spi-nor commands, both dummy bus cycle bytes and width are zero. Because of the cpu's warning when divided by zero, the warning should be avoided. Return just zero to avoid such calculations.
[
{
"id": "CVE-2025-21793-0baac6b9",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"333045930744635281294092538818928262175",
"51704894105213284307615770165774195357",
"236777746425526220495168636372797160598",
"129275184446907938342709262005739774515"
],
"threshold": 0.9
},
"target": {
"file": "drivers/spi/spi-sn-f-ospi.c"
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4df6f005bef04a3dd16c028124a1b5684db3922b"
},
{
"id": "CVE-2025-21793-117750ac",
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 118.0,
"function_hash": "57091252460799403164193061880129128596"
},
"target": {
"function": "f_ospi_get_dummy_cycle",
"file": "drivers/spi/spi-sn-f-ospi.c"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@966328191b4c389c0f2159fa242915f51cbc1679"
},
{
"id": "CVE-2025-21793-1d8ed170",
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 118.0,
"function_hash": "57091252460799403164193061880129128596"
},
"target": {
"function": "f_ospi_get_dummy_cycle",
"file": "drivers/spi/spi-sn-f-ospi.c"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4df6f005bef04a3dd16c028124a1b5684db3922b"
},
{
"id": "CVE-2025-21793-53bb626f",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"333045930744635281294092538818928262175",
"51704894105213284307615770165774195357",
"236777746425526220495168636372797160598",
"129275184446907938342709262005739774515"
],
"threshold": 0.9
},
"target": {
"file": "drivers/spi/spi-sn-f-ospi.c"
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3588b1c0fde2f58d166e3f94a5a58d64b893526c"
},
{
"id": "CVE-2025-21793-6daf1661",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"333045930744635281294092538818928262175",
"51704894105213284307615770165774195357",
"236777746425526220495168636372797160598",
"129275184446907938342709262005739774515"
],
"threshold": 0.9
},
"target": {
"file": "drivers/spi/spi-sn-f-ospi.c"
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7434135553bc03809a55803ee6a8dcaae6240d55"
},
{
"id": "CVE-2025-21793-a41cf0cc",
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 118.0,
"function_hash": "57091252460799403164193061880129128596"
},
"target": {
"function": "f_ospi_get_dummy_cycle",
"file": "drivers/spi/spi-sn-f-ospi.c"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3588b1c0fde2f58d166e3f94a5a58d64b893526c"
},
{
"id": "CVE-2025-21793-a5b22de0",
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 118.0,
"function_hash": "57091252460799403164193061880129128596"
},
"target": {
"function": "f_ospi_get_dummy_cycle",
"file": "drivers/spi/spi-sn-f-ospi.c"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7434135553bc03809a55803ee6a8dcaae6240d55"
},
{
"id": "CVE-2025-21793-aae41cf9",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"333045930744635281294092538818928262175",
"51704894105213284307615770165774195357",
"236777746425526220495168636372797160598",
"129275184446907938342709262005739774515"
],
"threshold": 0.9
},
"target": {
"file": "drivers/spi/spi-sn-f-ospi.c"
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@966328191b4c389c0f2159fa242915f51cbc1679"
}
]