CVE-2025-38070

Source
https://cve.org/CVERecord?id=CVE-2025-38070
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38070.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38070
Downstream
Published
2025-06-18T09:33:47.351Z
Modified
2026-03-09T23:51:23.925276Z
Summary
ASoC: sma1307: Add NULL check in sma1307_setting_loaded()
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: sma1307: Add NULL check in sma1307settingloaded()

All varibale allocated by kzalloc and devm_kzalloc could be NULL. Multiple pointer checks and their cleanup are added.

This issue is found by our static analysis tool

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38070.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
576c57e6b4c1d734bcb7cc33dde9a99a9383b520
Fixed
f8434b8ba437d3f6cbcd9ffe8405bd16ed28fc5c
Fixed
0ec6bd16705fe21d6429d6b8f7981eae2142bba8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38070.json"