Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: clk: davinci: Add NULL check in davinci_lpsc_clk_register() devm_kasprintf() returns NULL when memory allocation fails. Currently, davinci_lpsc_clk_register() does not check for this case, which results in a NULL pointer dereference. Add NULL check after devm_kasprintf() to prevent this issue and ensuring no resources are left allocated.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.17, < 5.4.297 |
| Debian | Debian Linux | 11.0 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/105e8115944a9f93e9412abe7bb07ed96725adf9Patch
- https://git.kernel.org/stable/c/13de464f445d42738fe18c9a28bab056ba3a290aPatch
- https://git.kernel.org/stable/c/1d92608a29251278015f57f3572bc950db7519f0Patch
- https://git.kernel.org/stable/c/23f564326deaafacfd7adf6104755b15216d8320Patch
- https://git.kernel.org/stable/c/2adc945b70c4d97e9491a6c0c9f3b217a9eecfbaPatch
- https://git.kernel.org/stable/c/6fb19cdcf040e1dec052a9032acb66cc2ad1d43fPatch
- https://git.kernel.org/stable/c/77e9ad7a2d0e2a771c9e0be04b9d1639413b5f13Patch
- https://git.kernel.org/stable/c/7843412e5927dafbb844782c56b6380564064109Patch
- https://git.kernel.org/stable/c/7943ed1f05f5cb7372dca2aa227f848747a98791Patch
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.htmlThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlThird Party Advisory
FAQ
What is CVE-2025-38635?
CVE-2025-38635 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: clk: davinci: Add NULL check in davinci_lpsc_clk_register() devm_kasprintf() returns NULL when memory allocation fails. Currently,...
How severe is CVE-2025-38635?
CVE-2025-38635 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-38635?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux.