CVE-2025-38138
dmaengine: ti: Add NULL check in udma_probe()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: Add NULL check in udma_probe() devm_kasprintf() returns NULL when memory allocation fails. Currently, udma_probe() does not check for this case, which results in a NULL pointer dereference. Add NULL check after devm_kasprintf() to prevent this issue.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jul 3, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
25dcb5dd7b7ce5587c1df18f584ff78f51a68a94 < ec1ea394c40523835bbedd8fc4934b77b461b6fe 25dcb5dd7b7ce5587c1df18f584ff78f51a68a94 < 9f133e04c62246353b8b1f0a679535c65161ebcf 25dcb5dd7b7ce5587c1df18f584ff78f51a68a94 < d61d5ba5bd5b0e39e30b34dcd92946e084bca0d0 25dcb5dd7b7ce5587c1df18f584ff78f51a68a94 < b79e10050d9d1e200541d25751dd5cb8ec58483c 25dcb5dd7b7ce5587c1df18f584ff78f51a68a94 < bc6ddff79835f71310a21645d8fcf08ec473e969 25dcb5dd7b7ce5587c1df18f584ff78f51a68a94 < 643db430f4cbd91dd2b63c49d62d0abb6debc13b 25dcb5dd7b7ce5587c1df18f584ff78f51a68a94 < fd447415e74bccd7362f760d4ea727f8e1ebfe91
Linux / Linux
5.6
References
git.kernel.org: https://git.kernel.org/stable/c/ec1ea394c40523835bbedd8fc4934b77b461b6fe git.kernel.org: https://git.kernel.org/stable/c/9f133e04c62246353b8b1f0a679535c65161ebcf git.kernel.org: https://git.kernel.org/stable/c/d61d5ba5bd5b0e39e30b34dcd92946e084bca0d0 git.kernel.org: https://git.kernel.org/stable/c/b79e10050d9d1e200541d25751dd5cb8ec58483c git.kernel.org: https://git.kernel.org/stable/c/bc6ddff79835f71310a21645d8fcf08ec473e969 git.kernel.org: https://git.kernel.org/stable/c/643db430f4cbd91dd2b63c49d62d0abb6debc13b git.kernel.org: https://git.kernel.org/stable/c/fd447415e74bccd7362f760d4ea727f8e1ebfe91 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html