CVE-2025-38655NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
OSV3.2
EPSS
0.0%
top 97.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 22
Latest updateDec 15

Description

In the Linux kernel, the following vulnerability has been resolved: pinctrl: canaan: k230: add NULL check in DT parse Add a NULL check for the return value of of_get_property() when retrieving the "pinmux" property in the group parser. This avoids a potential NULL pointer dereference if the property is missing from the device tree node. Also fix a typo ("sintenel") in the device ID match table comment, correcting it to "sentinel".

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel6.136.15.10+1
CVEListV5linux/linux545887eab6f6776a7477fe7e83860eab57138b03b5ae84aeff60b8819e8568ff0c57590caed9e6d3+3
debiandebian/linux

Patches

🔴Vulnerability Details

8
OSV
linux-azure, linux-azure-6.14 vulnerabilities2025-12-15
OSV
linux-gcp-6.14, linux-raspi vulnerabilities2025-12-04
OSV
linux-aws-6.14, linux-oracle-6.14 vulnerabilities2025-11-26
OSV
linux-oem-6.14 vulnerabilities2025-11-21
OSV
linux, linux-aws, linux-gcp, linux-hwe-6.14, linux-oracle, linux-realtime vulnerabilities2025-11-21

📋Vendor Advisories

7
Ubuntu
Linux kernel (Azure) vulnerabilities2025-12-15
Ubuntu
Linux kernel vulnerabilities2025-12-04
Ubuntu
Linux kernel vulnerabilities2025-11-26
Ubuntu
Linux kernel (Real-time) vulnerabilities2025-11-21
Ubuntu
Linux kernel (OEM) vulnerabilities2025-11-21
CVE-2025-38655 — NULL Pointer Dereference in Linux | cvebase