{"id":"CVE-2025-38138","summary":"dmaengine: ti: Add NULL check in udma_probe()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: Add NULL check in udma_probe()\n\ndevm_kasprintf() returns NULL when memory allocation fails. Currently,\nudma_probe() does not check for this case, which results in a NULL\npointer dereference.\n\nAdd NULL check after devm_kasprintf() to prevent this issue.","modified":"2026-04-16T04:31:04.956337001Z","published":"2025-07-03T08:35:40.499Z","related":["SUSE-SU-2025:02853-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:02969-1","SUSE-SU-2025:02996-1","SUSE-SU-2025:02997-1","SUSE-SU-2025:03011-1","SUSE-SU-2025:03023-1","SUSE-SU-2025:20577-1","SUSE-SU-2025:20586-1","SUSE-SU-2025:20601-1","SUSE-SU-2025:20602-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","openSUSE-SU-2025:20081-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38138.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/643db430f4cbd91dd2b63c49d62d0abb6debc13b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9f133e04c62246353b8b1f0a679535c65161ebcf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b79e10050d9d1e200541d25751dd5cb8ec58483c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bc6ddff79835f71310a21645d8fcf08ec473e969"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d61d5ba5bd5b0e39e30b34dcd92946e084bca0d0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ec1ea394c40523835bbedd8fc4934b77b461b6fe"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fd447415e74bccd7362f760d4ea727f8e1ebfe91"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38138.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38138"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"25dcb5dd7b7ce5587c1df18f584ff78f51a68a94"},{"fixed":"ec1ea394c40523835bbedd8fc4934b77b461b6fe"},{"fixed":"9f133e04c62246353b8b1f0a679535c65161ebcf"},{"fixed":"d61d5ba5bd5b0e39e30b34dcd92946e084bca0d0"},{"fixed":"b79e10050d9d1e200541d25751dd5cb8ec58483c"},{"fixed":"bc6ddff79835f71310a21645d8fcf08ec473e969"},{"fixed":"643db430f4cbd91dd2b63c49d62d0abb6debc13b"},{"fixed":"fd447415e74bccd7362f760d4ea727f8e1ebfe91"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38138.json"}}],"schema_version":"1.7.5"}