CVE-2025-38634

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38634
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38634.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38634
Downstream
Related
Published
2025-08-22T16:00:42.376Z
Modified
2025-11-28T02:34:27.555331Z
Summary
power: supply: cpcap-charger: Fix null check for power_supply_get_by_name
Details

In the Linux kernel, the following vulnerability has been resolved:

power: supply: cpcap-charger: Fix null check for powersupplygetbyname

In the cpcapusbdetect() function, the powersupplygetbyname() function may return NULL instead of an error pointer. To prevent potential null pointer dereferences, Added a null check.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38634.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
eab4e6d953c1059a30ac0f15826abc7dd2374d3c
Fixed
4ebbb9106aaa2fd58e0359bc3a2490953db2ef0c
Fixed
a2436263144980cc99a9860c7b43335847afbe53
Fixed
8e9bdb563916287ba1b4258812434e0585ac6d00
Fixed
f642500aa7ed93d2606e4f929244cce9c7467b3a
Fixed
9784d832d7c103539cd9afb376534eaa35815d3d
Fixed
27001e4f146624c4b3389b029bdc0f8049819560
Fixed
d9fa3aae08f99493e67fb79413c0e95d30fca5e9

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
5.15.190
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.148
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.102
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.42
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.10
Type
ECOSYSTEM
Events
Introduced
6.16.0
Fixed
6.16.1