-

CVE-2025-38535

In the Linux kernel, the following vulnerability has been resolved:

phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode

When transitioning from USB_ROLE_DEVICE to USB_ROLE_NONE, the code
assumed that the regulator should be disabled. However, if the regulator
is marked as always-on, regulator_is_enabled() continues to return true,
leading to an incorrect attempt to disable a regulator which is not
enabled.

This can result in warnings such as:

[  250.155624] WARNING: CPU: 1 PID: 7326 at drivers/regulator/core.c:3004
_regulator_disable+0xe4/0x1a0
[  250.155652] unbalanced disables for VIN_SYS_5V0

To fix this, we move the regulator control logic into
tegra186_xusb_padctl_id_override() function since it's directly related
to the ID override state. The regulator is now only disabled when the role
transitions from USB_ROLE_HOST to USB_ROLE_NONE, by checking the VBUS_ID
register. This ensures that regulator enable/disable operations are
properly balanced and only occur when actually transitioning to/from host
mode.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < ceb645ac6ce052609ee5c8f819a80e8881789b04
Version 49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status affected
Version < cdcb0ffd6448f6be898956913a42bd08e59fb2ae
Version 49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status affected
Version < 1bb85b5c2bd43b687c3d54eb6328917f90dd38fc
Version 49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status affected
Version < 5367cdeb75cb6c687ca468450bceb2602ab239d8
Version 49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status affected
Version < ec7f98ff05f0649af0adeb4808c7ba23d6111ef9
Version 49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status affected
Version < eaa420339658615d26c1cc95cd6cf720b9aebfca
Version 49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status affected
Version < cefc1caee9dd06c69e2d807edc5949b329f52b22
Version 49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.7
Status affected
Version < 5.7
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.147
Status unaffected
Version <= 6.6.*
Version 6.6.100
Status unaffected
Version <= 6.12.*
Version 6.12.40
Status unaffected
Version <= 6.15.*
Version 6.15.8
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.088
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string