CVE-2025-38259
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-09

Last updated on: 2025-12-18

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd9335: Fix missing free of regulator supplies Driver gets and enables all regulator supplies in probe path (wcd9335_parse_dt() and wcd9335_power_on_reset()), but does not cleanup in final error paths and in unbind (missing remove() callback). This leads to leaked memory and unbalanced regulator enable count during probe errors or unbind. Fix this by converting entire code into devm_regulator_bulk_get_enable() which also greatly simplifies the code.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-09
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-07-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
linux linux_kernel From 6.7 (inc) to 6.12.36 (inc)
debian debian_linux 11.0
linux kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-416 The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel's ASoC wcd9335 codec driver involves a missing cleanup of regulator supplies during error handling and device unbinding. The driver enables regulator supplies during initialization but fails to free them properly if errors occur or when the device is removed, leading to memory leaks and unbalanced regulator enable counts. The fix involves using devm_regulator_bulk_get_enable() to manage regulators more safely and simplify the code.


How can this vulnerability impact me? :

The impact of this vulnerability is primarily resource leakage, such as memory leaks and unbalanced regulator enable counts, which could lead to system instability or degraded performance over time if the driver repeatedly fails to clean up resources properly during errors or device removal.


What immediate steps should I take to mitigate this vulnerability?

Apply the patch that fixes the missing free of regulator supplies in the wcd9335 codec driver by updating the Linux kernel to a version that includes the fix converting the code to use devm_regulator_bulk_get_enable(), which ensures proper cleanup and prevents memory leaks and unbalanced regulator enable counts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart