{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-37989","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:23.976Z","datePublished":"2025-05-20T17:09:21.419Z","dateUpdated":"2026-05-11T21:19:09.547Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:19:09.547Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: leds: fix memory leak\n\nA network restart test on a router led to an out-of-memory condition,\nwhich was traced to a memory leak in the PHY LED trigger code.\n\nThe root cause is misuse of the devm API. The registration function\n(phy_led_triggers_register) is called from phy_attach_direct, not\nphy_probe, and the unregister function (phy_led_triggers_unregister)\nis called from phy_detach, not phy_remove. This means the register and\nunregister functions can be called multiple times for the same PHY\ndevice, but devm-allocated memory is not freed until the driver is\nunbound.\n\nThis also prevents kmemleak from detecting the leak, as the devm API\ninternally stores the allocated pointer.\n\nFix this by replacing devm_kzalloc/devm_kcalloc with standard\nkzalloc/kcalloc, and add the corresponding kfree calls in the unregister\npath."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/phy/phy_led_triggers.c"],"versions":[{"version":"2e0bc452f4721520502575362a9cd3c1248d2337","lessThan":"966d6494e2ed9be9052fcd9815afba830896aaf8","status":"affected","versionType":"git"},{"version":"2e0bc452f4721520502575362a9cd3c1248d2337","lessThan":"95bed65cc0eb2a610550abf849a8b94374da80a7","status":"affected","versionType":"git"},{"version":"2e0bc452f4721520502575362a9cd3c1248d2337","lessThan":"663c3da86e807c6c07ed48f911c7526fad6fe1ff","status":"affected","versionType":"git"},{"version":"2e0bc452f4721520502575362a9cd3c1248d2337","lessThan":"f41f097f68a33d392579885426d0734a81219501","status":"affected","versionType":"git"},{"version":"2e0bc452f4721520502575362a9cd3c1248d2337","lessThan":"618541a6cc1511064dfa58c89b3445e21844092f","status":"affected","versionType":"git"},{"version":"2e0bc452f4721520502575362a9cd3c1248d2337","lessThan":"41143e71052a00d654c15dc924fda50c1e7357d0","status":"affected","versionType":"git"},{"version":"2e0bc452f4721520502575362a9cd3c1248d2337","lessThan":"7f3d5880800f962c347777c4f8358f29f5fc403c","status":"affected","versionType":"git"},{"version":"2e0bc452f4721520502575362a9cd3c1248d2337","lessThan":"b7f0ee992adf601aa00c252418266177eb7ac2bc","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/phy/phy_led_triggers.c"],"versions":[{"version":"4.10","status":"affected"},{"version":"0","lessThan":"4.10","status":"unaffected","versionType":"semver"},{"version":"5.4.293","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.237","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.181","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.136","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.89","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.26","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.14.5","lessThanOrEqual":"6.14.*","status":"unaffected","versionType":"semver"},{"version":"6.15","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"5.4.293"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"5.10.237"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"5.15.181"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"6.1.136"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"6.6.89"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"6.12.26"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"6.14.5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"6.15"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/966d6494e2ed9be9052fcd9815afba830896aaf8"},{"url":"https://git.kernel.org/stable/c/95bed65cc0eb2a610550abf849a8b94374da80a7"},{"url":"https://git.kernel.org/stable/c/663c3da86e807c6c07ed48f911c7526fad6fe1ff"},{"url":"https://git.kernel.org/stable/c/f41f097f68a33d392579885426d0734a81219501"},{"url":"https://git.kernel.org/stable/c/618541a6cc1511064dfa58c89b3445e21844092f"},{"url":"https://git.kernel.org/stable/c/41143e71052a00d654c15dc924fda50c1e7357d0"},{"url":"https://git.kernel.org/stable/c/7f3d5880800f962c347777c4f8358f29f5fc403c"},{"url":"https://git.kernel.org/stable/c/b7f0ee992adf601aa00c252418266177eb7ac2bc"}],"title":"net: phy: leds: fix memory leak","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T19:58:02.430Z"}}]}}