CVE-2025-39921

Source
https://cve.org/CVERecord?id=CVE-2025-39921
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-39921.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-39921
Downstream
Published
2025-10-01T07:55:16.540Z
Modified
2026-04-02T12:48:12.755276Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
spi: microchip-core-qspi: stop checking viability of op->max_freq in supports_op callback
Details

In the Linux kernel, the following vulnerability has been resolved:

spi: microchip-core-qspi: stop checking viability of op->maxfreq in supportsop callback

In commit 13529647743d9 ("spi: microchip-core-qspi: Support per spi-mem operation frequency switches") the logic for checking the viability of op->maxfreq in mchpcoreqspisetupclock() was copied into mchpcoreqspisupportsop(). Unfortunately, op->maxfreq is not valid when this function is called during probe but is instead zero. Accordingly, baudrateval is calculated to be INT_MAX due to division by zero, causing probe of the attached memory device to fail.

Seemingly spi-microchip-core-qspi was the only driver that had such a modification made to its supportsop callback when the perop_freq capability was added, so just remove it to restore prior functionality.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39921.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
13529647743d906ed3cf991f1d77727e7ff1fb6f
Fixed
ac8a13f35d5b8996582b3f97b924838a5c570c18
Fixed
89e7353f522f5cf70cb48c01ce2dcdcb275b8022

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-39921.json"