In the Linux kernel, the following vulnerability has been resolved:
clk: bcm: rpi: Add NULL check in raspberrypiclkregister()
devmkasprintf() returns NULL when memory allocation fails. Currently, raspberrypiclk_register() does not check for this case, which results in a NULL pointer dereference.
Add NULL check after devm_kasprintf() to prevent this issue.
[
{
"signature_version": "v1",
"signature_type": "Function",
"deprecated": false,
"digest": {
"function_hash": "296166980872805201713189077778377467678",
"length": 1601.0
},
"target": {
"function": "raspberrypi_clk_register",
"file": "drivers/clk/bcm/clk-raspberrypi.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3c1adc2f8c732ea09e8c4bce5941fec019c6205d",
"id": "CVE-2025-38160-080102bd"
},
{
"signature_version": "v1",
"signature_type": "Function",
"deprecated": false,
"digest": {
"function_hash": "296166980872805201713189077778377467678",
"length": 1601.0
},
"target": {
"function": "raspberrypi_clk_register",
"file": "drivers/clk/bcm/clk-raspberrypi.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a2712cd24ecfeb520af60f6f859b442c7ab01ff",
"id": "CVE-2025-38160-7ae87a4f"
},
{
"signature_version": "v1",
"signature_type": "Line",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"193446635168515327998197166957478691737",
"3878077127144011805098046874002595116",
"269344432063976205626145975745269528535",
"251601304691711960036986219611595745569"
]
},
"target": {
"file": "drivers/clk/bcm/clk-raspberrypi.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a2712cd24ecfeb520af60f6f859b442c7ab01ff",
"id": "CVE-2025-38160-cbc1f8df"
},
{
"signature_version": "v1",
"signature_type": "Line",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"193446635168515327998197166957478691737",
"3878077127144011805098046874002595116",
"269344432063976205626145975745269528535",
"251601304691711960036986219611595745569"
]
},
"target": {
"file": "drivers/clk/bcm/clk-raspberrypi.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3c1adc2f8c732ea09e8c4bce5941fec019c6205d",
"id": "CVE-2025-38160-ecc30666"
},
{
"signature_version": "v1",
"signature_type": "Function",
"deprecated": false,
"digest": {
"function_hash": "296166980872805201713189077778377467678",
"length": 1601.0
},
"target": {
"function": "raspberrypi_clk_register",
"file": "drivers/clk/bcm/clk-raspberrypi.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@52562161df3567cdaedada46834a7a8d8c4ab737",
"id": "CVE-2025-38160-edce1c62"
},
{
"signature_version": "v1",
"signature_type": "Line",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"193446635168515327998197166957478691737",
"3878077127144011805098046874002595116",
"269344432063976205626145975745269528535",
"251601304691711960036986219611595745569"
]
},
"target": {
"file": "drivers/clk/bcm/clk-raspberrypi.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@52562161df3567cdaedada46834a7a8d8c4ab737",
"id": "CVE-2025-38160-fb19d343"
}
]