CVE-2025-38479

Source
https://cve.org/CVERecord?id=CVE-2025-38479
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38479.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38479
Downstream
Published
2025-04-18T07:01:33.022Z
Modified
2026-03-09T23:58:17.885866Z
Summary
dmaengine: fsl-edma: free irq correctly in remove path
Details

In the Linux kernel, the following vulnerability has been resolved:

dmaengine: fsl-edma: free irq correctly in remove path

Add fsledma->txirq/errirq check to avoid below warning because no errirq at i.MX9 platform. Otherwise there will be kernel dump: WARNING: CPU: 0 PID: 11 at kernel/irq/devres.c:144 devmfreeirq+0x74/0x80 Modules linked in: CPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc7#18 Hardware name: NXP i.MX93 11X11 EVK board (DT) Workqueue: eventsunbound deferredprobeworkfunc pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : devmfreeirq+0x74/0x80 lr : devmfreeirq+0x48/0x80 Call trace: devmfreeirq+0x74/0x80 (P) devmfreeirq+0x48/0x80 (L) fsledmaremove+0xc4/0xc8 platformremove+0x28/0x44 device_remove+0x4c/0x80

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38479.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
44eb827264de4f14d8317692441e13f5e2aadbf2
Fixed
55e2dbe2ba787d4fc2306f6bb2f43fb32176e184
Fixed
38ff8769074db27387cb2323aaa751e59d168e6a
Fixed
f3834d2d68749e4760c27325149765930ad876fd
Fixed
fa70c4c3c580c239a0f9e83a14770ab026e8d820

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38479.json"