In the Linux kernel, the following vulnerability has been resolved:
dmaengine: ti: Add NULL check in udma_probe()
devmkasprintf() returns NULL when memory allocation fails. Currently, udmaprobe() does not check for this case, which results in a NULL pointer dereference.
Add NULL check after devm_kasprintf() to prevent this issue.
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"253128949035221418907698017589256496155",
"280720141829099664285774069174953754894",
"209318711521882939647889366134059283716"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d61d5ba5bd5b0e39e30b34dcd92946e084bca0d0",
"id": "CVE-2025-38138-027e591e"
},
{
"digest": {
"function_hash": "275180706705566981766763876578692675444",
"length": 5288.0
},
"signature_type": "Function",
"target": {
"function": "udma_probe",
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ec1ea394c40523835bbedd8fc4934b77b461b6fe",
"id": "CVE-2025-38138-0500144a"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"253128949035221418907698017589256496155",
"280720141829099664285774069174953754894",
"209318711521882939647889366134059283716"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@643db430f4cbd91dd2b63c49d62d0abb6debc13b",
"id": "CVE-2025-38138-0a4097f3"
},
{
"digest": {
"function_hash": "133864188826079033444209230280955817083",
"length": 6844.0
},
"signature_type": "Function",
"target": {
"function": "udma_probe",
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d61d5ba5bd5b0e39e30b34dcd92946e084bca0d0",
"id": "CVE-2025-38138-0b69a488"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"253128949035221418907698017589256496155",
"280720141829099664285774069174953754894",
"209318711521882939647889366134059283716"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ec1ea394c40523835bbedd8fc4934b77b461b6fe",
"id": "CVE-2025-38138-289b50cf"
},
{
"digest": {
"function_hash": "120525972136982353496038726787620442801",
"length": 6736.0
},
"signature_type": "Function",
"target": {
"function": "udma_probe",
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@643db430f4cbd91dd2b63c49d62d0abb6debc13b",
"id": "CVE-2025-38138-29e0ceb5"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"253128949035221418907698017589256496155",
"280720141829099664285774069174953754894",
"209318711521882939647889366134059283716"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b79e10050d9d1e200541d25751dd5cb8ec58483c",
"id": "CVE-2025-38138-4b377856"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"253128949035221418907698017589256496155",
"280720141829099664285774069174953754894",
"209318711521882939647889366134059283716"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc6ddff79835f71310a21645d8fcf08ec473e969",
"id": "CVE-2025-38138-56fa0844"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"253128949035221418907698017589256496155",
"280720141829099664285774069174953754894",
"209318711521882939647889366134059283716"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fd447415e74bccd7362f760d4ea727f8e1ebfe91",
"id": "CVE-2025-38138-68e52f28"
},
{
"digest": {
"function_hash": "120525972136982353496038726787620442801",
"length": 6736.0
},
"signature_type": "Function",
"target": {
"function": "udma_probe",
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc6ddff79835f71310a21645d8fcf08ec473e969",
"id": "CVE-2025-38138-8b2810ed"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"253128949035221418907698017589256496155",
"280720141829099664285774069174953754894",
"209318711521882939647889366134059283716"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f133e04c62246353b8b1f0a679535c65161ebcf",
"id": "CVE-2025-38138-9655a03b"
},
{
"digest": {
"function_hash": "120525972136982353496038726787620442801",
"length": 6736.0
},
"signature_type": "Function",
"target": {
"function": "udma_probe",
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b79e10050d9d1e200541d25751dd5cb8ec58483c",
"id": "CVE-2025-38138-9978ce41"
},
{
"digest": {
"function_hash": "21988417671752743302504415460059764532",
"length": 6840.0
},
"signature_type": "Function",
"target": {
"function": "udma_probe",
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f133e04c62246353b8b1f0a679535c65161ebcf",
"id": "CVE-2025-38138-e4904fba"
},
{
"digest": {
"function_hash": "120525972136982353496038726787620442801",
"length": 6736.0
},
"signature_type": "Function",
"target": {
"function": "udma_probe",
"file": "drivers/dma/ti/k3-udma.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fd447415e74bccd7362f760d4ea727f8e1ebfe91",
"id": "CVE-2025-38138-ec0e1717"
}
]