{"id":"CVE-2025-38384","summary":"mtd: spinand: fix memory leak of ECC engine conf","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: spinand: fix memory leak of ECC engine conf\n\nMemory allocated for the ECC engine conf is not released during spinand\ncleanup. Below kmemleak trace is seen for this memory leak:\n\nunreferenced object 0xffffff80064f00e0 (size 8):\n  comm \"swapper/0\", pid 1, jiffies 4294937458\n  hex dump (first 8 bytes):\n    00 00 00 00 00 00 00 00                          ........\n  backtrace (crc 0):\n    kmemleak_alloc+0x30/0x40\n    __kmalloc_cache_noprof+0x208/0x3c0\n    spinand_ondie_ecc_init_ctx+0x114/0x200\n    nand_ecc_init_ctx+0x70/0xa8\n    nanddev_ecc_engine_init+0xec/0x27c\n    spinand_probe+0xa2c/0x1620\n    spi_mem_probe+0x130/0x21c\n    spi_probe+0xf0/0x170\n    really_probe+0x17c/0x6e8\n    __driver_probe_device+0x17c/0x21c\n    driver_probe_device+0x58/0x180\n    __device_attach_driver+0x15c/0x1f8\n    bus_for_each_drv+0xec/0x150\n    __device_attach+0x188/0x24c\n    device_initial_probe+0x10/0x20\n    bus_probe_device+0x11c/0x160\n\nFix the leak by calling nanddev_ecc_engine_cleanup() inside\nspinand_cleanup().","modified":"2026-04-16T00:03:21.891016604Z","published":"2025-07-25T12:53:25.396Z","related":["SUSE-SU-2025:02853-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:02969-1","SUSE-SU-2025:02996-1","SUSE-SU-2025:02997-1","SUSE-SU-2025:03011-1","SUSE-SU-2025:03023-1","SUSE-SU-2025:20577-1","SUSE-SU-2025:20586-1","SUSE-SU-2025:20601-1","SUSE-SU-2025:20602-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38384.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/6463cbe08b0cbf9bba8763306764f5fd643023e1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/68d3417305ee100dcad90fd6e5846b22497aa394"},{"type":"WEB","url":"https://git.kernel.org/stable/c/93147abf80a831dd3b5660b3309b4f09546073b2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c40b207cafd006c610832ba52a81cedee77adcb9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d5c1e3f32902ab518519d05515ee6030fd6c59ae"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f99408670407abb6493780e38cb4ece3fbb52cfc"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38384.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38384"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3d1f08b032dc4e168f3aefed1e07a63c3c080325"},{"fixed":"68d3417305ee100dcad90fd6e5846b22497aa394"},{"fixed":"f99408670407abb6493780e38cb4ece3fbb52cfc"},{"fixed":"d5c1e3f32902ab518519d05515ee6030fd6c59ae"},{"fixed":"c40b207cafd006c610832ba52a81cedee77adcb9"},{"fixed":"93147abf80a831dd3b5660b3309b4f09546073b2"},{"fixed":"6463cbe08b0cbf9bba8763306764f5fd643023e1"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38384.json"}}],"schema_version":"1.7.5"}