In the Linux kernel, the following vulnerability has been resolved:
soc: samsung: exynos-chipid: Add NULL pointer check in exynoschipidprobe()
socdevattr->revision could be NULL, thus, a pointer check is added to prevent potential NULL pointer dereference. This is similar to the fix in commit 3027e7b15b02 ("ice: Fix some null pointer dereference issues in ice_ptp.c").
This issue is found by our static analysis tool.
[
{
"deprecated": false,
"target": {
"file": "drivers/soc/samsung/exynos-chipid.c",
"function": "exynos_chipid_probe"
},
"digest": {
"length": 1157.0,
"function_hash": "221757349370525483970075757692506711748"
},
"id": "CVE-2025-23148-1a2bb089",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5f80fd2ff8bfd13e41554741740e0ca8e6445ded",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/soc/samsung/exynos-chipid.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"144308465004142903268611793901577491863",
"263069570866969541480116783809495590689",
"35852454773068260797320010987844700984",
"32513332193669471687353264752067792568"
]
},
"id": "CVE-2025-23148-33e92c55",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5f80fd2ff8bfd13e41554741740e0ca8e6445ded",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/soc/samsung/exynos-chipid.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"144308465004142903268611793901577491863",
"263069570866969541480116783809495590689",
"35852454773068260797320010987844700984",
"32513332193669471687353264752067792568"
]
},
"id": "CVE-2025-23148-4a0e171d",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8ce469d23205249bb17c1135ccadea879576adfc",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/soc/samsung/exynos-chipid.c",
"function": "exynos_chipid_probe"
},
"digest": {
"length": 1157.0,
"function_hash": "221757349370525483970075757692506711748"
},
"id": "CVE-2025-23148-4d439690",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8ce469d23205249bb17c1135ccadea879576adfc",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/soc/samsung/exynos-chipid.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"144308465004142903268611793901577491863",
"263069570866969541480116783809495590689",
"35852454773068260797320010987844700984",
"32513332193669471687353264752067792568"
]
},
"id": "CVE-2025-23148-87959e56",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8ee067cf0cf82429e9b204283c7d0d8d6891d10e",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/soc/samsung/exynos-chipid.c",
"function": "exynos_chipid_probe"
},
"digest": {
"length": 1157.0,
"function_hash": "221757349370525483970075757692506711748"
},
"id": "CVE-2025-23148-a251ae72",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8ee067cf0cf82429e9b204283c7d0d8d6891d10e",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/soc/samsung/exynos-chipid.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"144308465004142903268611793901577491863",
"263069570866969541480116783809495590689",
"35852454773068260797320010987844700984",
"32513332193669471687353264752067792568"
]
},
"id": "CVE-2025-23148-a8833392",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c8222ef6cf29dd7cad21643228f96535cc02b327",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/soc/samsung/exynos-chipid.c",
"function": "exynos_chipid_probe"
},
"digest": {
"length": 1157.0,
"function_hash": "221757349370525483970075757692506711748"
},
"id": "CVE-2025-23148-b15d8353",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c8222ef6cf29dd7cad21643228f96535cc02b327",
"signature_version": "v1"
}
]