CVE-2025-38668
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
22/08/2025
Last modified:
08/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
regulator: core: fix NULL dereference on unbind due to stale coupling data<br />
<br />
Failing to reset coupling_desc.n_coupled after freeing coupled_rdevs can<br />
lead to NULL pointer dereference when regulators are accessed post-unbind.<br />
<br />
This can happen during runtime PM or other regulator operations that rely<br />
on coupling metadata.<br />
<br />
For example, on ridesx4, unbinding the &#39;reg-dummy&#39; platform device triggers<br />
a panic in regulator_lock_recursive() due to stale coupling state.<br />
<br />
Ensure n_coupled is set to 0 to prevent access to invalid pointers.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.3 (including) | 5.4.297 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.241 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.190 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.148 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.101 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.41 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/233d3c54c9620e95193923859ea1d0b0f5d748ca
- https://git.kernel.org/stable/c/5d4261dbb3335221fd9c6e69f909ba79ee6663a7
- https://git.kernel.org/stable/c/6c49eac796681e250e34156bafb643930310bd4a
- https://git.kernel.org/stable/c/7574892e259bbb16262ebfb4b65a2054a5e03a49
- https://git.kernel.org/stable/c/800a2cfb2df7f96b3fb48910fc595e0215f6b019
- https://git.kernel.org/stable/c/ca46946a482238b0cdea459fb82fc837fb36260e
- https://git.kernel.org/stable/c/ca9bef9ba1a6be640c87bf802d2e9e696021576a
- https://git.kernel.org/stable/c/d7e59c5fd7a0f5e16e75a30a89ea2c4ab88612b8
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



