Home

Description

In the Linux kernel, the following vulnerability has been resolved: spi: stm32: Check for cfg availability in stm32_spi_probe The stm32_spi_probe function now includes a check to ensure that the pointer returned by of_device_get_match_data is not NULL before accessing its members. This resolves a warning where a potential NULL pointer dereference could occur when accessing cfg->has_device_mode. Before accessing the 'has_device_mode' member, we verify that 'cfg' is not NULL. If 'cfg' is NULL, an error message is logged. This change ensures that the driver does not attempt to access configuration data if it is not available, thus preventing a potential system crash due to a NULL pointer dereference.

PUBLISHED Reserved 2025-04-16 | Published 2025-08-22 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

fee681646fc831b154619ac0261afedcc7e671e7 before 6031a54f4eac921efe6122a561d44df89b37f2d4
affected

fee681646fc831b154619ac0261afedcc7e671e7 before a7645815edf4478f3258bb0db95a08986a77f5c0
affected

fee681646fc831b154619ac0261afedcc7e671e7 before 3a571a8d52272cc26858ab1bc83d0f66e5dee938
affected

fee681646fc831b154619ac0261afedcc7e671e7 before cc063d23ad80ef7d201c41b2716b1bae7c662cf9
affected

fee681646fc831b154619ac0261afedcc7e671e7 before 21f1c800f6620e43f31dfd76709dbac8ebaa5a16
affected

Default status
affected

6.6
affected

Any version before 6.6
unaffected

6.6.102
unaffected

6.12.42
unaffected

6.15.10
unaffected

6.16.1
unaffected

6.17
unaffected

References

git.kernel.org/...c/6031a54f4eac921efe6122a561d44df89b37f2d4

git.kernel.org/...c/a7645815edf4478f3258bb0db95a08986a77f5c0

git.kernel.org/...c/3a571a8d52272cc26858ab1bc83d0f66e5dee938

git.kernel.org/...c/cc063d23ad80ef7d201c41b2716b1bae7c662cf9

git.kernel.org/...c/21f1c800f6620e43f31dfd76709dbac8ebaa5a16

cve.org (CVE-2025-38648)

nvd.nist.gov (CVE-2025-38648)

Download JSON