CVE-2025-38648

medium

Description

In the Linux kernel, the following vulnerability has been resolved: spi: stm32: Check for cfg availability in stm32_spi_probe The stm32_spi_probe function now includes a check to ensure that the pointer returned by of_device_get_match_data is not NULL before accessing its members. This resolves a warning where a potential NULL pointer dereference could occur when accessing cfg->has_device_mode. Before accessing the 'has_device_mode' member, we verify that 'cfg' is not NULL. If 'cfg' is NULL, an error message is logged. This change ensures that the driver does not attempt to access configuration data if it is not available, thus preventing a potential system crash due to a NULL pointer dereference.

References

https://git.kernel.org/stable/c/cc063d23ad80ef7d201c41b2716b1bae7c662cf9

https://git.kernel.org/stable/c/a7645815edf4478f3258bb0db95a08986a77f5c0

https://git.kernel.org/stable/c/6031a54f4eac921efe6122a561d44df89b37f2d4

https://git.kernel.org/stable/c/3a571a8d52272cc26858ab1bc83d0f66e5dee938

https://git.kernel.org/stable/c/21f1c800f6620e43f31dfd76709dbac8ebaa5a16

Details

Source: Mitre, NVD

Published: 2025-08-22

Updated: 2025-08-22

Risk Information

CVSS v2

Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P

Severity: Low

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00018