CVE-2025-38423

7.8 HIGH

📋 TL;DR

A double-free vulnerability in the Linux kernel's WCD9375 audio codec driver allows attackers to cause memory corruption and potentially crash the system or execute arbitrary code. This affects Linux systems using the WCD9375 audio hardware. The vulnerability occurs when the driver incorrectly frees regulator supplies that were already managed by devm functions.

💻 Affected Systems

Products:
  • Linux kernel with WCD9375 audio codec support
Versions: Linux kernel versions containing the vulnerable WCD9375 driver code before fixes were applied
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with WCD9375 audio hardware present and driver loaded.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or potential privilege escalation to kernel-level code execution if combined with other vulnerabilities.

🟠

Likely Case

System instability, kernel crashes, or denial of service affecting audio functionality.

🟢

If Mitigated

Limited to audio subsystem issues or system crashes without privilege escalation.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger audio subsystem operations.
🏢 Internal Only: MEDIUM - Local users or processes could trigger the vulnerability, potentially causing system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to trigger audio subsystem operations. Memory corruption could be leveraged with additional vulnerabilities for more severe impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 63fe298652d4, c8228b5f3d74, and ce30258c05d3

Vendor Advisory: https://git.kernel.org/stable/c/63fe298652d4eda07d738bfcbbc59d1343a675ef

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load patched kernel. 3. Verify WCD9375 driver is no longer calling regulator_bulk_free() in error/remove paths.

🔧 Temporary Workarounds

Disable WCD9375 audio driver

linux

Prevent loading of the vulnerable driver module

echo 'blacklist snd-soc-wcd9375' >> /etc/modprobe.d/blacklist.conf
rmmod snd-soc-wcd9375

🧯 If You Can't Patch

  • Restrict local user access to systems with WCD9375 hardware
  • Monitor system logs for kernel crashes or audio subsystem errors

🔍 How to Verify

Check if Vulnerable:

Check if WCD9375 driver is loaded: lsmod | grep wcd9375. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits. Check that regulator_bulk_free() calls are removed from WCD9375 driver error/remove paths.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • Audio subsystem errors
  • Double-free detection in kernel logs

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("panic" OR "WCD9375" OR "double free")

🔗 References

📤 Share & Export