๐Ÿ” CVE Alert

CVE-2025-38395

UNKNOWN 0.0

regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods drvdata::gpiods is supposed to hold an array of 'gpio_desc' pointers. But the memory is allocated for only one pointer. This will lead to out-of-bounds access later in the code if 'config::ngpios' is > 1. So fix the code to allocate enough memory to hold 'config::ngpios' of GPIO descriptors. While at it, also move the check for memory allocation failure to be below the allocation to make it more readable.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 25, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d6cd33ad71029a3f77ba1686caf55d4dea58d916 < a3cd5ae7befbac849e0e0529c94ca04e8093cfd2 d6cd33ad71029a3f77ba1686caf55d4dea58d916 < 9fe71972869faed1f8f9b3beb9040f9c1b300c79 d6cd33ad71029a3f77ba1686caf55d4dea58d916 < 56738cbac3bbb1d39a71a07f57484dec1db8b239 d6cd33ad71029a3f77ba1686caf55d4dea58d916 < a1e12fac214d4f49fcb186dbdf9c5592e7fa0a7a d6cd33ad71029a3f77ba1686caf55d4dea58d916 < 24418bc77a66cb5be9f5a837431ba3674ed8b52f d6cd33ad71029a3f77ba1686caf55d4dea58d916 < e4d19e5d71b217940e33f2ef6c6962b7b68c5606 d6cd33ad71029a3f77ba1686caf55d4dea58d916 < 3830ab97cda9599872625cc0dc7b00160193634f d6cd33ad71029a3f77ba1686caf55d4dea58d916 < c9764fd88bc744592b0604ccb6b6fc1a5f76b4e3
Linux / Linux
5.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a3cd5ae7befbac849e0e0529c94ca04e8093cfd2 git.kernel.org: https://git.kernel.org/stable/c/9fe71972869faed1f8f9b3beb9040f9c1b300c79 git.kernel.org: https://git.kernel.org/stable/c/56738cbac3bbb1d39a71a07f57484dec1db8b239 git.kernel.org: https://git.kernel.org/stable/c/a1e12fac214d4f49fcb186dbdf9c5592e7fa0a7a git.kernel.org: https://git.kernel.org/stable/c/24418bc77a66cb5be9f5a837431ba3674ed8b52f git.kernel.org: https://git.kernel.org/stable/c/e4d19e5d71b217940e33f2ef6c6962b7b68c5606 git.kernel.org: https://git.kernel.org/stable/c/3830ab97cda9599872625cc0dc7b00160193634f git.kernel.org: https://git.kernel.org/stable/c/c9764fd88bc744592b0604ccb6b6fc1a5f76b4e3 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html