In the Linux kernel, the following vulnerability has been resolved:
remoteproc: core: Release rproc->cleantable after rprocattach() fails
When rproc->state = RPROCDETACHED is attached to remote processor through rprocattach(), if rprochandleresources() returns failure, then the clean table should be released, otherwise the following memory leak will occur.
unreferenced object 0xffff000086a99800 (size 1024): comm "kworker/u12:3", pid 59, jiffies 4294893670 (age 121.140s) hex dump (first 32 bytes): 00 00 00 00 00 80 00 00 00 00 00 00 00 00 10 00 ............ 00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 ............ backtrace: [<000000008bbe4ca8>] slabpostallochook+0x98/0x3fc [<000000003b8a272b>] _kmemcacheallocnode+0x13c/0x230 [<000000007a507c51>] _kmallocnodetrackcaller+0x5c/0x260 [<0000000037818dae>] kmemdup+0x34/0x60 [<00000000610f7f57>] rprocboot+0x35c/0x56c [<0000000065f8871a>] rprocadd+0x124/0x17c [<00000000497416ee>] imxrprocprobe+0x4ec/0x5d4 [<000000003bcaa37d>] platformprobe+0x68/0xd8 [<00000000771577f9>] reallyprobe+0x110/0x27c [<00000000531fea59>] _driverprobedevice+0x78/0x12c [<0000000080036a04>] driverprobedevice+0x3c/0x118 [<000000007e0bddcb>] _deviceattachdriver+0xb8/0xf8 [<000000000cf1fa33>] busforeachdrv+0x84/0xe4 [<000000001a53b53e>] _deviceattach+0xfc/0x18c [<00000000d1a2a32c>] deviceinitialprobe+0x14/0x20 [<00000000d8f8b7ae>] busprobedevice+0xb0/0xb4 unreferenced object 0xffff0000864c9690 (size 16):
[
{
"id": "CVE-2025-38418-058881aa",
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/remoteproc_core.c",
"function": "rproc_attach"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3562c09feeb8d8e9d102ce6840e8c7d57a7feb5c",
"digest": {
"length": 1001.0,
"function_hash": "37469560874808869082707531659047949742"
},
"signature_version": "v1"
},
{
"id": "CVE-2025-38418-25a8f83f",
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/remoteproc_core.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3562c09feeb8d8e9d102ce6840e8c7d57a7feb5c",
"digest": {
"line_hashes": [
"12492989120726115817561895477059406259",
"334109555851401831026574459845044112265",
"936475596461575328041410377473112329",
"106707275541781273941538124510107426505"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2025-38418-32cf6891",
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/remoteproc_core.c",
"function": "rproc_attach"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bf876fd9dc2d0c9fff96aef63d4346719f206fc1",
"digest": {
"length": 1001.0,
"function_hash": "37469560874808869082707531659047949742"
},
"signature_version": "v1"
},
{
"id": "CVE-2025-38418-32fc057f",
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/remoteproc_core.c",
"function": "rproc_attach"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bcd241230fdbc6005230f80a4f8646ff5a84f15b",
"digest": {
"length": 1001.0,
"function_hash": "37469560874808869082707531659047949742"
},
"signature_version": "v1"
},
{
"id": "CVE-2025-38418-503861b2",
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/remoteproc_core.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bf876fd9dc2d0c9fff96aef63d4346719f206fc1",
"digest": {
"line_hashes": [
"12492989120726115817561895477059406259",
"334109555851401831026574459845044112265",
"936475596461575328041410377473112329",
"106707275541781273941538124510107426505"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2025-38418-63a855d5",
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/remoteproc_core.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3ee979709e16a83b257bc9a544a7ff71fd445ea9",
"digest": {
"line_hashes": [
"12492989120726115817561895477059406259",
"334109555851401831026574459845044112265",
"936475596461575328041410377473112329",
"106707275541781273941538124510107426505"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2025-38418-8c101727",
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/remoteproc_core.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bcd241230fdbc6005230f80a4f8646ff5a84f15b",
"digest": {
"line_hashes": [
"12492989120726115817561895477059406259",
"334109555851401831026574459845044112265",
"936475596461575328041410377473112329",
"106707275541781273941538124510107426505"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2025-38418-dbbffca1",
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/remoteproc_core.c",
"function": "rproc_attach"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3ee979709e16a83b257bc9a544a7ff71fd445ea9",
"digest": {
"length": 1001.0,
"function_hash": "37469560874808869082707531659047949742"
},
"signature_version": "v1"
}
]