In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]serial: jsm: fix NPE during jsm_uart_port_init[EOL][EOL]No device was set which caused serial_base_ctrl_add to crash.[EOL][EOL] BUG: kernel NULL pointer dereference, address: 0000000000000050[EOL] Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI[EOL] CPU: 16 UID: 0 PID: 368 Comm: (udev-worker) Not tainted 6.12.25-amd64 #1 Debian 6.12.25-1[EOL] RIP: 0010:serial_base_ctrl_add+0x96/0x120[EOL] Call Trace:[EOL] <TASK>[EOL] serial_core_register_port+0x1a0/0x580[EOL] ? __setup_irq+0x39c/0x660[EOL] ? __kmalloc_cache_noprof+0x111/0x310[EOL] jsm_uart_port_init+0xe8/0x180 [jsm][EOL] jsm_probe_one+0x1f4/0x410 [jsm][EOL] local_pci_probe+0x42/0x90[EOL] pci_device_probe+0x22f/0x270[EOL] really_probe+0xdb/0x340[EOL] ? pm_runtime_barrier+0x54/0x90[EOL] ? __pfx___driver_attach+0x10/0x10[EOL] __driver_probe_device+0x78/0x110[EOL] driver_probe_device+0x1f/0xa0[EOL] __driver_attach+0xba/0x1c0[EOL] bus_for_each_dev+0x8c/0xe0[EOL] bus_add_driver+0x112/0x1f0[EOL] driver_register+0x72/0xd0[EOL] jsm_init_module+0x36/0xff0 [jsm][EOL] ? __pfx_jsm_init_module+0x10/0x10 [jsm][EOL] do_one_initcall+0x58/0x310[EOL] do_init_module+0x60/0x230[EOL][EOL]Tested with Digi Neo PCIe 8 port card. CREATE(Triage):(User=admin) [CVE-2025-38265 (https://nvd.nist.gov/vuln/detail/CVE-2025-38265)