{"id":"CVE-2025-38655","summary":"pinctrl: canaan: k230: add NULL check in DT parse","details":"In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: canaan: k230: add NULL check in DT parse\n\nAdd a NULL check for the return value of of_get_property() when\nretrieving the \"pinmux\" property in the group parser. This avoids\na potential NULL pointer dereference if the property is missing\nfrom the device tree node.\n\nAlso fix a typo (\"sintenel\") in the device ID match table comment,\ncorrecting it to \"sentinel\".","modified":"2026-03-20T12:42:58.038397Z","published":"2025-08-22T16:00:58.839Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38655.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/5d324b262c0ff256b8d603596574d66267b6394f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/65bd0be486390fc12a84eafaad78758c5e5a55e6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b5ae84aeff60b8819e8568ff0c57590caed9e6d3"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38655.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38655"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"545887eab6f6776a7477fe7e83860eab57138b03"},{"fixed":"b5ae84aeff60b8819e8568ff0c57590caed9e6d3"},{"fixed":"5d324b262c0ff256b8d603596574d66267b6394f"},{"fixed":"65bd0be486390fc12a84eafaad78758c5e5a55e6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38655.json"}}],"schema_version":"1.7.5"}