-

CVE-2025-38655

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: canaan: k230: add NULL check in DT parse

Add a NULL check for the return value of of_get_property() when
retrieving the "pinmux" property in the group parser. This avoids
a potential NULL pointer dereference if the property is missing
from the device tree node.

Also fix a typo ("sintenel") in the device ID match table comment,
correcting it to "sentinel".

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < b5ae84aeff60b8819e8568ff0c57590caed9e6d3
Version 545887eab6f6776a7477fe7e83860eab57138b03
Status affected
Version < 5d324b262c0ff256b8d603596574d66267b6394f
Version 545887eab6f6776a7477fe7e83860eab57138b03
Status affected
Version < 65bd0be486390fc12a84eafaad78758c5e5a55e6
Version 545887eab6f6776a7477fe7e83860eab57138b03
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.13
Status affected
Version < 6.13
Version 0
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.048
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string