We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38259

ASoC: codecs: wcd9335: Fix missing free of regulator supplies



Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd9335: Fix missing free of regulator supplies Driver gets and enables all regulator supplies in probe path (wcd9335_parse_dt() and wcd9335_power_on_reset()), but does not cleanup in final error paths and in unbind (missing remove() callback). This leads to leaked memory and unbalanced regulator enable count during probe errors or unbind. Fix this by converting entire code into devm_regulator_bulk_get_enable() which also greatly simplifies the code.

Reserved 2025-04-16 | Published 2025-07-09 | Updated 2025-07-09 | Assigner Linux

Product status

Default status
unaffected

20aedafdf4926e7a957f8b302a18c8fb75c7e332 before edadaf4239c14dc8a19ea7f60b97d5524d93c29b
affected

20aedafdf4926e7a957f8b302a18c8fb75c7e332 before 9830ef1803a5bc50b4a984a06cf23142cd46229d
affected

20aedafdf4926e7a957f8b302a18c8fb75c7e332 before a8795f3cd289cd958f6396a1b43ba46fa8e22a2e
affected

20aedafdf4926e7a957f8b302a18c8fb75c7e332 before b86280aaa23c1c0f31bcaa600d35ddc45bc38b7a
affected

20aedafdf4926e7a957f8b302a18c8fb75c7e332 before 9079db287fc3e38e040b0edeb0a25770bb679c8e
affected

Default status
affected

5.1
affected

Any version before 5.1
unaffected

6.1.143
unaffected

6.6.96
unaffected

6.12.36
unaffected

6.15.5
unaffected

6.16-rc1
unaffected

References

git.kernel.org/...c/edadaf4239c14dc8a19ea7f60b97d5524d93c29b

git.kernel.org/...c/9830ef1803a5bc50b4a984a06cf23142cd46229d

git.kernel.org/...c/a8795f3cd289cd958f6396a1b43ba46fa8e22a2e

git.kernel.org/...c/b86280aaa23c1c0f31bcaa600d35ddc45bc38b7a

git.kernel.org/...c/9079db287fc3e38e040b0edeb0a25770bb679c8e

cve.org (CVE-2025-38259)

nvd.nist.gov (CVE-2025-38259)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38259

Support options

Helpdesk Chat, Email, Knowledgebase