-
CVE-2025-38537
- EPSS 0.03%
- Published 16.08.2025 11:12:29
- Last modified 18.08.2025 20:16:28
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: net: phy: Don't register LEDs for genphy If a PHY has no driver, the genphy driver is probed/removed directly in phy_attach/detach. If the PHY's ofnode has an "leds" subnode, then the LEDs will be (un)registered when probing/removing the genphy driver. This could occur if the leds are for a non-generic driver that isn't loaded for whatever reason. Synchronously removing the PHY device in phy_detach leads to the following deadlock: rtnl_lock() ndo_close() ... phy_detach() phy_remove() phy_leds_unregister() led_classdev_unregister() led_trigger_set() netdev_trigger_deactivate() unregister_netdevice_notifier() rtnl_lock() There is a corresponding deadlock on the open/register side of things (and that one is reported by lockdep), but it requires a race while this one is deterministic. Generic PHYs do not support LEDs anyway, so don't bother registering them.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
ec158d05eaa91b2809cab65f8068290e3c05ebdd
Version
01e5b728e9e43ae444e0369695a5f72209906464
Status
affected
Version <
fd6493533af9e5d73d0d42ff2a8ded978a701dc6
Version
01e5b728e9e43ae444e0369695a5f72209906464
Status
affected
Version <
75e1b2079ef0653a2f7aa69be515d86b7faf1908
Version
01e5b728e9e43ae444e0369695a5f72209906464
Status
affected
Version <
f0f2b992d8185a0366be951685e08643aae17d6d
Version
01e5b728e9e43ae444e0369695a5f72209906464
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.4
Status
affected
Version <
6.4
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.100
Status
unaffected
Version <=
6.12.*
Version
6.12.40
Status
unaffected
Version <=
6.15.*
Version
6.15.8
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.055 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|