CVE-2025-38479

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38479
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38479.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-38479
Downstream
Published
2025-04-18T07:15:43Z
Modified
2025-05-05T17:00:20Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

dmaengine: fsl-edma: free irq correctly in remove path

Add fsledma->txirq/errirq check to avoid below warning because no errirq at i.MX9 platform. Otherwise there will be kernel dump: WARNING: CPU: 0 PID: 11 at kernel/irq/devres.c:144 devmfreeirq+0x74/0x80 Modules linked in: CPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc7#18 Hardware name: NXP i.MX93 11X11 EVK board (DT) Workqueue: eventsunbound deferredprobeworkfunc pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : devmfreeirq+0x74/0x80 lr : devmfreeirq+0x48/0x80 Call trace: devmfreeirq+0x74/0x80 (P) devmfreeirq+0x48/0x80 (L) fsledmaremove+0xc4/0xc8 platformremove+0x28/0x44 device_remove+0x4c/0x80

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.25-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}