Acknowledged
Created: Aug 24, 2025
Updated: Aug 26, 2025
Found In Version: 10.24.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]spi: stm32: Check for cfg availability in stm32_spi_probe[EOL][EOL]The stm32_spi_probe function now includes a check to ensure that the[EOL]pointer returned by of_device_get_match_data is not NULL before[EOL]accessing its members. This resolves a warning where a potential NULL[EOL]pointer dereference could occur when accessing cfg->has_device_mode.[EOL][EOL]Before accessing the 'has_device_mode' member, we verify that 'cfg' is[EOL]not NULL. If 'cfg' is NULL, an error message is logged.[EOL][EOL]This change ensures that the driver does not attempt to access[EOL]configuration data if it is not available, thus preventing a potential[EOL]system crash due to a NULL pointer dereference.
CREATE(Triage):(User=pbi-cn) [CVE-2025-38648 (https://nvd.nist.gov/vuln/detail/CVE-2025-38648)