In the Linux kernel, the following vulnerability has been resolved:
HID: uclogic: Add NULL check in uclogicinputconfigured()
devmkasprintf() returns NULL when memory allocation fails. Currently, uclogicinput_configured() does not check for this case, which results in a NULL pointer dereference.
Add NULL check after devm_kasprintf() to prevent this issue.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38007.json"
}[
{
"digest": {
"length": 1105.0,
"function_hash": "180899089120681775018056278613360199096"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b616453d719ee1b8bf2ea6f6cc6c6258a572a590",
"deprecated": false,
"id": "CVE-2025-38007-221833c4",
"signature_type": "Function",
"target": {
"function": "uclogic_input_configured",
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"17131466282161599915350244225848146549",
"244055625552963858071642451197722108164",
"16519276938296303806546087793004722064",
"127642512249658974704850461708309587790",
"338919579045658762526156157041923557163",
"18336064608580170697253786310403215458",
"104278884804817472342683232179754071869"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@01b76cc8ca243fc3376b035aa326bbc4f03d384b",
"deprecated": false,
"id": "CVE-2025-38007-466064b5",
"signature_type": "Line",
"target": {
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"281142350849297111629109770898933556086",
"75427858114143110438908362761800613343",
"127642512249658974704850461708309587790",
"338919579045658762526156157041923557163",
"18336064608580170697253786310403215458",
"104278884804817472342683232179754071869"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@00d52b2fa6083dd0f5c44f3604cd1bad1f9177dc",
"deprecated": false,
"id": "CVE-2025-38007-58d31e56",
"signature_type": "Line",
"target": {
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
},
{
"digest": {
"length": 1105.0,
"function_hash": "180899089120681775018056278613360199096"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@94e7272b636a0677082e0604609e4c471e0a2caf",
"deprecated": false,
"id": "CVE-2025-38007-5bb396b4",
"signature_type": "Function",
"target": {
"function": "uclogic_input_configured",
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"281142350849297111629109770898933556086",
"75427858114143110438908362761800613343",
"127642512249658974704850461708309587790",
"338919579045658762526156157041923557163",
"18336064608580170697253786310403215458",
"104278884804817472342683232179754071869"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a9f58479a1a2c6f72907679c4df2f4ed92b05b39",
"deprecated": false,
"id": "CVE-2025-38007-5d4ba3fb",
"signature_type": "Line",
"target": {
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
},
{
"digest": {
"length": 786.0,
"function_hash": "7389198358184687127811447494371579807"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a9f58479a1a2c6f72907679c4df2f4ed92b05b39",
"deprecated": false,
"id": "CVE-2025-38007-677a352e",
"signature_type": "Function",
"target": {
"function": "uclogic_input_configured",
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
},
{
"digest": {
"length": 786.0,
"function_hash": "7389198358184687127811447494371579807"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@00d52b2fa6083dd0f5c44f3604cd1bad1f9177dc",
"deprecated": false,
"id": "CVE-2025-38007-6f68851d",
"signature_type": "Function",
"target": {
"function": "uclogic_input_configured",
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"17131466282161599915350244225848146549",
"244055625552963858071642451197722108164",
"16519276938296303806546087793004722064",
"127642512249658974704850461708309587790",
"338919579045658762526156157041923557163",
"18336064608580170697253786310403215458",
"104278884804817472342683232179754071869"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bd07f751208ba190f9b0db5e5b7f35d5bb4a8a1e",
"deprecated": false,
"id": "CVE-2025-38007-6faefdef",
"signature_type": "Line",
"target": {
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"17131466282161599915350244225848146549",
"244055625552963858071642451197722108164",
"16519276938296303806546087793004722064",
"127642512249658974704850461708309587790",
"338919579045658762526156157041923557163",
"18336064608580170697253786310403215458",
"104278884804817472342683232179754071869"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@94e7272b636a0677082e0604609e4c471e0a2caf",
"deprecated": false,
"id": "CVE-2025-38007-7d5bf16c",
"signature_type": "Line",
"target": {
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
},
{
"digest": {
"length": 1105.0,
"function_hash": "180899089120681775018056278613360199096"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bd07f751208ba190f9b0db5e5b7f35d5bb4a8a1e",
"deprecated": false,
"id": "CVE-2025-38007-8ba40453",
"signature_type": "Function",
"target": {
"function": "uclogic_input_configured",
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
},
{
"digest": {
"length": 1105.0,
"function_hash": "180899089120681775018056278613360199096"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad6caaf29bc26a48b1241ce82561fcbcf0a75aa9",
"deprecated": false,
"id": "CVE-2025-38007-bd98dea2",
"signature_type": "Function",
"target": {
"function": "uclogic_input_configured",
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"17131466282161599915350244225848146549",
"244055625552963858071642451197722108164",
"16519276938296303806546087793004722064",
"127642512249658974704850461708309587790",
"338919579045658762526156157041923557163",
"18336064608580170697253786310403215458",
"104278884804817472342683232179754071869"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b616453d719ee1b8bf2ea6f6cc6c6258a572a590",
"deprecated": false,
"id": "CVE-2025-38007-c22d32a2",
"signature_type": "Line",
"target": {
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
},
{
"digest": {
"length": 1105.0,
"function_hash": "180899089120681775018056278613360199096"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@01b76cc8ca243fc3376b035aa326bbc4f03d384b",
"deprecated": false,
"id": "CVE-2025-38007-d39cc0dc",
"signature_type": "Function",
"target": {
"function": "uclogic_input_configured",
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"17131466282161599915350244225848146549",
"244055625552963858071642451197722108164",
"16519276938296303806546087793004722064",
"127642512249658974704850461708309587790",
"338919579045658762526156157041923557163",
"18336064608580170697253786310403215458",
"104278884804817472342683232179754071869"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad6caaf29bc26a48b1241ce82561fcbcf0a75aa9",
"deprecated": false,
"id": "CVE-2025-38007-fc1f6b81",
"signature_type": "Line",
"target": {
"file": "drivers/hid/hid-uclogic-core.c"
},
"signature_version": "v1"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38007.json"