CVE-2025-38384

In the Linux kernel, the following vulnerability has been resolved: mtd: spinand: fix memory leak of ECC engine conf Memory allocated for the ECC engine conf is not released during spinand cleanup. Below kmemleak trace is seen for this memory leak: unreferenced object 0xffffff80064f00e0 (size 8): comm "swapper/0", pid 1, jiffies 4294937458 hex dump (first 8 bytes): 00 00 00 00 00 00 00 00 ........ backtrace (crc 0): kmemleak_alloc+0x30/0x40 __kmalloc_cache_noprof+0x208/0x3c0 spinand_ondie_ecc_init_ctx+0x114/0x200 nand_ecc_init_ctx+0x70/0xa8 nanddev_ecc_engine_init+0xec/0x27c spinand_probe+0xa2c/0x1620 spi_mem_probe+0x130/0x21c spi_probe+0xf0/0x170 really_probe+0x17c/0x6e8 __driver_probe_device+0x17c/0x21c driver_probe_device+0x58/0x180 __device_attach_driver+0x15c/0x1f8 bus_for_each_drv+0xec/0x150 __device_attach+0x188/0x24c device_initial_probe+0x10/0x20 bus_probe_device+0x11c/0x160 Fix the leak by calling nanddev_ecc_engine_cleanup() inside spinand_cleanup().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Dec 2025, 20:11

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

15 Dec 2025, 17:02

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-401
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/6463cbe08b0cbf9bba8763306764f5fd643023e1 - () https://git.kernel.org/stable/c/6463cbe08b0cbf9bba8763306764f5fd643023e1 - Patch
References () https://git.kernel.org/stable/c/68d3417305ee100dcad90fd6e5846b22497aa394 - () https://git.kernel.org/stable/c/68d3417305ee100dcad90fd6e5846b22497aa394 - Patch
References () https://git.kernel.org/stable/c/93147abf80a831dd3b5660b3309b4f09546073b2 - () https://git.kernel.org/stable/c/93147abf80a831dd3b5660b3309b4f09546073b2 - Patch
References () https://git.kernel.org/stable/c/c40b207cafd006c610832ba52a81cedee77adcb9 - () https://git.kernel.org/stable/c/c40b207cafd006c610832ba52a81cedee77adcb9 - Patch
References () https://git.kernel.org/stable/c/d5c1e3f32902ab518519d05515ee6030fd6c59ae - () https://git.kernel.org/stable/c/d5c1e3f32902ab518519d05515ee6030fd6c59ae - Patch
References () https://git.kernel.org/stable/c/f99408670407abb6493780e38cb4ece3fbb52cfc - () https://git.kernel.org/stable/c/f99408670407abb6493780e38cb4ece3fbb52cfc - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mtd: spinand: corrige pérdida de memoria de la configuración del motor ECC. La memoria asignada para la configuración del motor ECC no se libera durante la limpieza de spinand. A continuación se ve el rastro de kmemleak para esta pérdida de memoria: objeto sin referencia 0xffffff80064f00e0 (tamaño 8): comm "swapper/0", pid 1, jiffies 4294937458 volcado hexadecimal (primeros 8 bytes): 00 00 00 00 00 00 00 00 ........ backtrace (crc 0): kmemleak_alloc+0x30/0x40 __kmalloc_cache_noprof+0x208/0x3c0 spinand_ondie_ecc_init_ctx+0x114/0x200 nand_ecc_init_ctx+0x70/0xa8 nanddev_ecc_engine_init+0xec/0x27c spinand_probe+0xa2c/0x1620 Corrija la pérdida llamando a nanddev_ecc_engine_cleanup() dentro de spinand_cleanup().

25 Jul 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-25 13:15

Updated : 2025-12-16 20:11


NVD link : CVE-2025-38384

Mitre link : CVE-2025-38384

CVE.ORG link : CVE-2025-38384


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime