{"id":"CVE-2025-38634","summary":"power: supply: cpcap-charger: Fix null check for power_supply_get_by_name","details":"In the Linux kernel, the following vulnerability has been resolved:\n\npower: supply: cpcap-charger: Fix null check for power_supply_get_by_name\n\nIn the cpcap_usb_detect() function, the power_supply_get_by_name()\nfunction may return `NULL` instead of an error pointer.\nTo prevent potential null pointer dereferences, Added a null check.","modified":"2026-03-20T12:42:57.439963Z","published":"2025-08-22T16:00:42.376Z","related":["MGASA-2025-0234","MGASA-2025-0235","SUSE-SU-2025:03272-1","SUSE-SU-2025:03290-1","SUSE-SU-2025:03301-1","SUSE-SU-2025:03382-1","SUSE-SU-2025:03602-1","SUSE-SU-2025:03633-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20653-1","SUSE-SU-2025:20669-1","SUSE-SU-2025:20739-1","SUSE-SU-2025:20756-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38634.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/27001e4f146624c4b3389b029bdc0f8049819560"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4ebbb9106aaa2fd58e0359bc3a2490953db2ef0c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8e9bdb563916287ba1b4258812434e0585ac6d00"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9784d832d7c103539cd9afb376534eaa35815d3d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a2436263144980cc99a9860c7b43335847afbe53"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d9fa3aae08f99493e67fb79413c0e95d30fca5e9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f642500aa7ed93d2606e4f929244cce9c7467b3a"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38634.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38634"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"eab4e6d953c1059a30ac0f15826abc7dd2374d3c"},{"fixed":"4ebbb9106aaa2fd58e0359bc3a2490953db2ef0c"},{"fixed":"a2436263144980cc99a9860c7b43335847afbe53"},{"fixed":"8e9bdb563916287ba1b4258812434e0585ac6d00"},{"fixed":"f642500aa7ed93d2606e4f929244cce9c7467b3a"},{"fixed":"9784d832d7c103539cd9afb376534eaa35815d3d"},{"fixed":"27001e4f146624c4b3389b029bdc0f8049819560"},{"fixed":"d9fa3aae08f99493e67fb79413c0e95d30fca5e9"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38634.json"}}],"schema_version":"1.7.5"}