First published: Tue Apr 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: pinctrl: nuvoton: npcm8xx: Add NULL check in npcm8xx_gpio_fw devm_kasprintf() calls can return null pointers on failure. But the return values were not checked in npcm8xx_gpio_fw(). Add NULL check in npcm8xx_gpio_fw(), to handle kernel NULL pointer dereference error.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21982 has a medium severity rating due to potential null pointer dereference risks.
The vulnerability could lead to a denial of service if the NULL pointer dereference occurs.
To fix CVE-2025-21982, update to the patched version of the Linux kernel that includes the NULL check.
CVE-2025-21982 affects various versions of the Linux kernel before the patch was applied.
There are no recommended workarounds for CVE-2025-21982; applying the kernel update is necessary.