Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-38634

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-22 Aug, 2025 | 16:00
Updated At-22 Aug, 2025 | 16:00
Rejected At-
Credits

power: supply: cpcap-charger: Fix null check for power_supply_get_by_name

In the Linux kernel, the following vulnerability has been resolved: power: supply: cpcap-charger: Fix null check for power_supply_get_by_name In the cpcap_usb_detect() function, the power_supply_get_by_name() function may return `NULL` instead of an error pointer. To prevent potential null pointer dereferences, Added a null check.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:22 Aug, 2025 | 16:00
Updated At:22 Aug, 2025 | 16:00
Rejected At:
▼CVE Numbering Authority (CNA)
power: supply: cpcap-charger: Fix null check for power_supply_get_by_name

In the Linux kernel, the following vulnerability has been resolved: power: supply: cpcap-charger: Fix null check for power_supply_get_by_name In the cpcap_usb_detect() function, the power_supply_get_by_name() function may return `NULL` instead of an error pointer. To prevent potential null pointer dereferences, Added a null check.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/power/supply/cpcap-charger.c
Default Status
unaffected
Versions
Affected
  • From eab4e6d953c1059a30ac0f15826abc7dd2374d3c before a2436263144980cc99a9860c7b43335847afbe53 (git)
  • From eab4e6d953c1059a30ac0f15826abc7dd2374d3c before 8e9bdb563916287ba1b4258812434e0585ac6d00 (git)
  • From eab4e6d953c1059a30ac0f15826abc7dd2374d3c before f642500aa7ed93d2606e4f929244cce9c7467b3a (git)
  • From eab4e6d953c1059a30ac0f15826abc7dd2374d3c before 9784d832d7c103539cd9afb376534eaa35815d3d (git)
  • From eab4e6d953c1059a30ac0f15826abc7dd2374d3c before 27001e4f146624c4b3389b029bdc0f8049819560 (git)
  • From eab4e6d953c1059a30ac0f15826abc7dd2374d3c before d9fa3aae08f99493e67fb79413c0e95d30fca5e9 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/power/supply/cpcap-charger.c
Default Status
affected
Versions
Affected
  • 5.14
Unaffected
  • From 0 before 5.14 (semver)
  • From 6.1.148 through 6.1.* (semver)
  • From 6.6.102 through 6.6.* (semver)
  • From 6.12.42 through 6.12.* (semver)
  • From 6.15.10 through 6.15.* (semver)
  • From 6.16.1 through 6.16.* (semver)
  • From 6.17-rc1 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/a2436263144980cc99a9860c7b43335847afbe53
N/A
https://git.kernel.org/stable/c/8e9bdb563916287ba1b4258812434e0585ac6d00
N/A
https://git.kernel.org/stable/c/f642500aa7ed93d2606e4f929244cce9c7467b3a
N/A
https://git.kernel.org/stable/c/9784d832d7c103539cd9afb376534eaa35815d3d
N/A
https://git.kernel.org/stable/c/27001e4f146624c4b3389b029bdc0f8049819560
N/A
https://git.kernel.org/stable/c/d9fa3aae08f99493e67fb79413c0e95d30fca5e9
N/A
Hyperlink: https://git.kernel.org/stable/c/a2436263144980cc99a9860c7b43335847afbe53
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/8e9bdb563916287ba1b4258812434e0585ac6d00
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f642500aa7ed93d2606e4f929244cce9c7467b3a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9784d832d7c103539cd9afb376534eaa35815d3d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/27001e4f146624c4b3389b029bdc0f8049819560
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d9fa3aae08f99493e67fb79413c0e95d30fca5e9
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:22 Aug, 2025 | 16:15
Updated At:22 Aug, 2025 | 18:08

In the Linux kernel, the following vulnerability has been resolved: power: supply: cpcap-charger: Fix null check for power_supply_get_by_name In the cpcap_usb_detect() function, the power_supply_get_by_name() function may return `NULL` instead of an error pointer. To prevent potential null pointer dereferences, Added a null check.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
CPE Matches

Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/27001e4f146624c4b3389b029bdc0f8049819560416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
https://git.kernel.org/stable/c/8e9bdb563916287ba1b4258812434e0585ac6d00416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
https://git.kernel.org/stable/c/9784d832d7c103539cd9afb376534eaa35815d3d416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
https://git.kernel.org/stable/c/a2436263144980cc99a9860c7b43335847afbe53416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
https://git.kernel.org/stable/c/d9fa3aae08f99493e67fb79413c0e95d30fca5e9416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
https://git.kernel.org/stable/c/f642500aa7ed93d2606e4f929244cce9c7467b3a416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
Hyperlink: https://git.kernel.org/stable/c/27001e4f146624c4b3389b029bdc0f8049819560
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/8e9bdb563916287ba1b4258812434e0585ac6d00
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9784d832d7c103539cd9afb376534eaa35815d3d
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a2436263144980cc99a9860c7b43335847afbe53
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d9fa3aae08f99493e67fb79413c0e95d30fca5e9
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f642500aa7ed93d2606e4f929244cce9c7467b3a
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found