CVE-2025-38535

In the Linux kernel, the following vulnerability has been resolved: phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode When transitioning from USB_ROLE_DEVICE to USB_ROLE_NONE, the code assumed that the regulator should be disabled. However, if the regulator is marked as always-on, regulator_is_enabled() continues to return true, leading to an incorrect attempt to disable a regulator which is not enabled. This can result in warnings such as: [ 250.155624] WARNING: CPU: 1 PID: 7326 at drivers/regulator/core.c:3004 _regulator_disable+0xe4/0x1a0 [ 250.155652] unbalanced disables for VIN_SYS_5V0 To fix this, we move the regulator control logic into tegra186_xusb_padctl_id_override() function since it's directly related to the ID override state. The regulator is now only disabled when the role transitions from USB_ROLE_HOST to USB_ROLE_NONE, by checking the VBUS_ID register. This ensures that regulator enable/disable operations are properly balanced and only occur when actually transitioning to/from host mode.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 18:56

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/1bb85b5c2bd43b687c3d54eb6328917f90dd38fc - () https://git.kernel.org/stable/c/1bb85b5c2bd43b687c3d54eb6328917f90dd38fc - Patch
References () https://git.kernel.org/stable/c/5367cdeb75cb6c687ca468450bceb2602ab239d8 - () https://git.kernel.org/stable/c/5367cdeb75cb6c687ca468450bceb2602ab239d8 - Patch
References () https://git.kernel.org/stable/c/cdcb0ffd6448f6be898956913a42bd08e59fb2ae - () https://git.kernel.org/stable/c/cdcb0ffd6448f6be898956913a42bd08e59fb2ae - Patch
References () https://git.kernel.org/stable/c/ceb645ac6ce052609ee5c8f819a80e8881789b04 - () https://git.kernel.org/stable/c/ceb645ac6ce052609ee5c8f819a80e8881789b04 - Patch
References () https://git.kernel.org/stable/c/cefc1caee9dd06c69e2d807edc5949b329f52b22 - () https://git.kernel.org/stable/c/cefc1caee9dd06c69e2d807edc5949b329f52b22 - Patch
References () https://git.kernel.org/stable/c/eaa420339658615d26c1cc95cd6cf720b9aebfca - () https://git.kernel.org/stable/c/eaa420339658615d26c1cc95cd6cf720b9aebfca - Patch
References () https://git.kernel.org/stable/c/ec7f98ff05f0649af0adeb4808c7ba23d6111ef9 - () https://git.kernel.org/stable/c/ec7f98ff05f0649af0adeb4808c7ba23d6111ef9 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List
CPE cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/cdcb0ffd6448f6be898956913a42bd08e59fb2ae -
  • () https://git.kernel.org/stable/c/ceb645ac6ce052609ee5c8f819a80e8881789b04 -

18 Aug 2025, 20:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: phy: tegra: xusb: Corregir la desactivación del regulador desequilibrado en el modo UTMI PHY Al realizar la transición de USB_ROLE_DEVICE a USB_ROLE_NONE, el código asumía que el regulador debía estar desactivado. Sin embargo, si el regulador está marcado como siempre activo, regulator_is_enabled() sigue devolviendo verdadero, lo que lleva a un intento incorrecto de desactivar un regulador que no está activado. Esto puede generar advertencias como: [ 250.155624] ADVERTENCIA: CPU: 1 PID: 7326 en drivers/regulator/core.c:3004 _regulator_disable+0xe4/0x1a0 [ 250.155652] desactivaciones desequilibradas para VIN_SYS_5V0 Para solucionar esto, movemos la lógica de control del regulador a la función tegra186_xusb_padctl_id_override() ya que está directamente relacionada con el estado de anulación de ID. El regulador ahora solo se desactiva cuando el rol cambia de USB_ROLE_HOST a USB_ROLE_NONE, mediante la comprobación del registro VBUS_ID. Esto garantiza que las operaciones de activación/desactivación del regulador estén correctamente equilibradas y solo se produzcan al cambiar al modo host o viceversa.

16 Aug 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-16 12:15

Updated : 2026-01-07 18:56


NVD link : CVE-2025-38535

Mitre link : CVE-2025-38535

CVE.ORG link : CVE-2025-38535


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel