-

CVE-2025-38452

In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: rtsn: Fix a null pointer dereference in rtsn_probe()

Add check for the return value of rcar_gen4_ptp_alloc()
to prevent potential null pointer dereference.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 9f260e16b297f8134c5f90bb5a20e805ff57e853
Version b0d3969d2b4db82602492cad576b8de494a12ddf
Status affected
Version < d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d
Version b0d3969d2b4db82602492cad576b8de494a12ddf
Status affected
Version < 95a234f6affbf51f06338383537ab80d637bb785
Version b0d3969d2b4db82602492cad576b8de494a12ddf
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.11
Status affected
Version < 6.11
Version 0
Status unaffected
Version <= 6.12.*
Version 6.12.39
Status unaffected
Version <= 6.15.*
Version 6.15.7
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.055
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string