In the Linux kernel, the following vulnerability has been resolved:
HID: uclogic: Add NULL check in uclogicinputconfigured()
devmkasprintf() returns NULL when memory allocation fails. Currently, uclogicinput_configured() does not check for this case, which results in a NULL pointer dereference.
Add NULL check after devm_kasprintf() to prevent this issue.
[
{
"digest": {
"function_hash": "180899089120681775018056278613360199096",
"length": 1105.0
},
"id": "CVE-2025-38007-221833c4",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b616453d719ee1b8bf2ea6f6cc6c6258a572a590",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "uclogic_input_configured",
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_type": "Function"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"17131466282161599915350244225848146549",
"244055625552963858071642451197722108164",
"16519276938296303806546087793004722064",
"127642512249658974704850461708309587790",
"338919579045658762526156157041923557163",
"18336064608580170697253786310403215458",
"104278884804817472342683232179754071869"
]
},
"id": "CVE-2025-38007-466064b5",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@01b76cc8ca243fc3376b035aa326bbc4f03d384b",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_type": "Line"
},
{
"digest": {
"function_hash": "180899089120681775018056278613360199096",
"length": 1105.0
},
"id": "CVE-2025-38007-5bb396b4",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@94e7272b636a0677082e0604609e4c471e0a2caf",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "uclogic_input_configured",
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_type": "Function"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"17131466282161599915350244225848146549",
"244055625552963858071642451197722108164",
"16519276938296303806546087793004722064",
"127642512249658974704850461708309587790",
"338919579045658762526156157041923557163",
"18336064608580170697253786310403215458",
"104278884804817472342683232179754071869"
]
},
"id": "CVE-2025-38007-6faefdef",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bd07f751208ba190f9b0db5e5b7f35d5bb4a8a1e",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_type": "Line"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"17131466282161599915350244225848146549",
"244055625552963858071642451197722108164",
"16519276938296303806546087793004722064",
"127642512249658974704850461708309587790",
"338919579045658762526156157041923557163",
"18336064608580170697253786310403215458",
"104278884804817472342683232179754071869"
]
},
"id": "CVE-2025-38007-7d5bf16c",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@94e7272b636a0677082e0604609e4c471e0a2caf",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_type": "Line"
},
{
"digest": {
"function_hash": "180899089120681775018056278613360199096",
"length": 1105.0
},
"id": "CVE-2025-38007-8ba40453",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bd07f751208ba190f9b0db5e5b7f35d5bb4a8a1e",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "uclogic_input_configured",
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_type": "Function"
},
{
"digest": {
"function_hash": "180899089120681775018056278613360199096",
"length": 1105.0
},
"id": "CVE-2025-38007-bd98dea2",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad6caaf29bc26a48b1241ce82561fcbcf0a75aa9",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "uclogic_input_configured",
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_type": "Function"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"17131466282161599915350244225848146549",
"244055625552963858071642451197722108164",
"16519276938296303806546087793004722064",
"127642512249658974704850461708309587790",
"338919579045658762526156157041923557163",
"18336064608580170697253786310403215458",
"104278884804817472342683232179754071869"
]
},
"id": "CVE-2025-38007-c22d32a2",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b616453d719ee1b8bf2ea6f6cc6c6258a572a590",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_type": "Line"
},
{
"digest": {
"function_hash": "180899089120681775018056278613360199096",
"length": 1105.0
},
"id": "CVE-2025-38007-d39cc0dc",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@01b76cc8ca243fc3376b035aa326bbc4f03d384b",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "uclogic_input_configured",
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_type": "Function"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"17131466282161599915350244225848146549",
"244055625552963858071642451197722108164",
"16519276938296303806546087793004722064",
"127642512249658974704850461708309587790",
"338919579045658762526156157041923557163",
"18336064608580170697253786310403215458",
"104278884804817472342683232179754071869"
]
},
"id": "CVE-2025-38007-fc1f6b81",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad6caaf29bc26a48b1241ce82561fcbcf0a75aa9",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_type": "Line"
}
]