{"vulnerability": "CVE-2025-38479", "sightings": [{"uuid": "183b964f-2ce6-4e52-87ab-841489fc964d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38479", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12402", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-38479\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: fsl-edma: free irq correctly in remove path\n\nAdd fsl_edma-&gt;txirq/errirq check to avoid below warning because no\nerrirq at i.MX9 platform. Otherwise there will be kernel dump:\nWARNING: CPU: 0 PID: 11 at kernel/irq/devres.c:144 devm_free_irq+0x74/0x80\nModules linked in:\nCPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc7#18\nHardware name: NXP i.MX93 11X11 EVK board (DT)\nWorkqueue: events_unbound deferred_probe_work_func\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : devm_free_irq+0x74/0x80\nlr : devm_free_irq+0x48/0x80\nCall trace:\n devm_free_irq+0x74/0x80 (P)\n devm_free_irq+0x48/0x80 (L)\n fsl_edma_remove+0xc4/0xc8\n platform_remove+0x28/0x44\n device_remove+0x4c/0x80\n\ud83d\udccf Published: 2025-04-18T07:01:33.022Z\n\ud83d\udccf Modified: 2025-04-18T07:01:33.022Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/55e2dbe2ba787d4fc2306f6bb2f43fb32176e184\n2. https://git.kernel.org/stable/c/38ff8769074db27387cb2323aaa751e59d168e6a\n3. https://git.kernel.org/stable/c/f3834d2d68749e4760c27325149765930ad876fd\n4. https://git.kernel.org/stable/c/fa70c4c3c580c239a0f9e83a14770ab026e8d820", "creation_timestamp": "2025-04-18T07:59:15.000000Z"}]}