CVE-2025-38655 — NULL Pointer Dereference in Linux
Severity
5.5MEDIUMNVD
OSV3.2
EPSS
0.0%
top 97.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 22
Latest updateDec 15
Description
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: canaan: k230: add NULL check in DT parse
Add a NULL check for the return value of of_get_property() when
retrieving the "pinmux" property in the group parser. This avoids
a potential NULL pointer dereference if the property is missing
from the device tree node.
Also fix a typo ("sintenel") in the device ID match table comment,
correcting it to "sentinel".
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages3 packages
▶CVEListV5linux/linux545887eab6f6776a7477fe7e83860eab57138b03 — b5ae84aeff60b8819e8568ff0c57590caed9e6d3+3
Patches
🔴Vulnerability Details
8OSV▶
linux, linux-aws, linux-gcp, linux-hwe-6.14, linux-oracle, linux-realtime vulnerabilities↗2025-11-21