-

CVE-2025-38635

In the Linux kernel, the following vulnerability has been resolved:

clk: davinci: Add NULL check in davinci_lpsc_clk_register()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
davinci_lpsc_clk_register() does not check for this case, which results
in a NULL pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue and ensuring
no resources are left allocated.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 77e9ad7a2d0e2a771c9e0be04b9d1639413b5f13
Version c6ed4d734bc7f731709dab0ffd69eed499dd5277
Status affected
Version < 7843412e5927dafbb844782c56b6380564064109
Version c6ed4d734bc7f731709dab0ffd69eed499dd5277
Status affected
Version < 2adc945b70c4d97e9491a6c0c9f3b217a9eecfba
Version c6ed4d734bc7f731709dab0ffd69eed499dd5277
Status affected
Version < 105e8115944a9f93e9412abe7bb07ed96725adf9
Version c6ed4d734bc7f731709dab0ffd69eed499dd5277
Status affected
Version < 1d92608a29251278015f57f3572bc950db7519f0
Version c6ed4d734bc7f731709dab0ffd69eed499dd5277
Status affected
Version < 7943ed1f05f5cb7372dca2aa227f848747a98791
Version c6ed4d734bc7f731709dab0ffd69eed499dd5277
Status affected
Version < 6fb19cdcf040e1dec052a9032acb66cc2ad1d43f
Version c6ed4d734bc7f731709dab0ffd69eed499dd5277
Status affected
Version < 23f564326deaafacfd7adf6104755b15216d8320
Version c6ed4d734bc7f731709dab0ffd69eed499dd5277
Status affected
Version < 13de464f445d42738fe18c9a28bab056ba3a290a
Version c6ed4d734bc7f731709dab0ffd69eed499dd5277
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.17
Status affected
Version < 4.17
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.06% 0.2
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string