CVE-2025-38648
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
22/08/2025
Last modified:
26/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
spi: stm32: Check for cfg availability in stm32_spi_probe<br />
<br />
The stm32_spi_probe function now includes a check to ensure that the<br />
pointer returned by of_device_get_match_data is not NULL before<br />
accessing its members. This resolves a warning where a potential NULL<br />
pointer dereference could occur when accessing cfg->has_device_mode.<br />
<br />
Before accessing the &#39;has_device_mode&#39; member, we verify that &#39;cfg&#39; is<br />
not NULL. If &#39;cfg&#39; is NULL, an error message is logged.<br />
<br />
This change ensures that the driver does not attempt to access<br />
configuration data if it is not available, thus preventing a potential<br />
system crash due to a NULL pointer dereference.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6 (including) | 6.6.102 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/21f1c800f6620e43f31dfd76709dbac8ebaa5a16
- https://git.kernel.org/stable/c/3a571a8d52272cc26858ab1bc83d0f66e5dee938
- https://git.kernel.org/stable/c/6031a54f4eac921efe6122a561d44df89b37f2d4
- https://git.kernel.org/stable/c/a7645815edf4478f3258bb0db95a08986a77f5c0
- https://git.kernel.org/stable/c/cc063d23ad80ef7d201c41b2716b1bae7c662cf9



