-
CVE-2025-38535
- EPSS 0.04%
- Veröffentlicht 16.08.2025 11:12:27
- Zuletzt bearbeitet 28.08.2025 15:15:52
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode When transitioning from USB_ROLE_DEVICE to USB_ROLE_NONE, the code assumed that the regulator should be disabled. However, if the regulator is marked as always-on, regulator_is_enabled() continues to return true, leading to an incorrect attempt to disable a regulator which is not enabled. This can result in warnings such as: [ 250.155624] WARNING: CPU: 1 PID: 7326 at drivers/regulator/core.c:3004 _regulator_disable+0xe4/0x1a0 [ 250.155652] unbalanced disables for VIN_SYS_5V0 To fix this, we move the regulator control logic into tegra186_xusb_padctl_id_override() function since it's directly related to the ID override state. The regulator is now only disabled when the role transitions from USB_ROLE_HOST to USB_ROLE_NONE, by checking the VBUS_ID register. This ensures that regulator enable/disable operations are properly balanced and only occur when actually transitioning to/from host mode.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
ceb645ac6ce052609ee5c8f819a80e8881789b04
Version
49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status
affected
Version <
cdcb0ffd6448f6be898956913a42bd08e59fb2ae
Version
49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status
affected
Version <
1bb85b5c2bd43b687c3d54eb6328917f90dd38fc
Version
49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status
affected
Version <
5367cdeb75cb6c687ca468450bceb2602ab239d8
Version
49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status
affected
Version <
ec7f98ff05f0649af0adeb4808c7ba23d6111ef9
Version
49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status
affected
Version <
eaa420339658615d26c1cc95cd6cf720b9aebfca
Version
49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status
affected
Version <
cefc1caee9dd06c69e2d807edc5949b329f52b22
Version
49d46e3c7e597e8b00c6fc16e6fd7a92044f4371
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.7
Status
affected
Version <
5.7
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.241
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.147
Status
unaffected
Version <=
6.6.*
Version
6.6.100
Status
unaffected
Version <=
6.12.*
Version
6.12.40
Status
unaffected
Version <=
6.15.*
Version
6.15.8
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.088 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|