-

CVE-2025-38583

In the Linux kernel, the following vulnerability has been resolved:

clk: xilinx: vcu: unregister pll_post only if registered correctly

If registration of pll_post is failed, it will be set to NULL or ERR,
unregistering same will fail with following call trace:

Unable to handle kernel NULL pointer dereference at virtual address 008
pc : clk_hw_unregister+0xc/0x20
lr : clk_hw_unregister_fixed_factor+0x18/0x30
sp : ffff800011923850
...
Call trace:
 clk_hw_unregister+0xc/0x20
 clk_hw_unregister_fixed_factor+0x18/0x30
 xvcu_unregister_clock_provider+0xcc/0xf4 [xlnx_vcu]
 xvcu_probe+0x2bc/0x53c [xlnx_vcu]

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 7e903da71f8bec4beb7c06707900e1ed8db843ca
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
Version < 88bd875b7f9c3652c27d6e4bb7a23701b764f762
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
Version < 51990eecf22f446550befdfd1a9f54147eafd636
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
Version < f1a1be99d5ae53d3b404415f1665eb59e8e02a8c
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
Version < 86124c5cfceb5ac04d2fddbf1b6f7147332d96a3
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
Version < a72b1c2d3b53e088bfaeb593949ff6fbd2cbe8ed
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
Version < 3b0abc443ac22f7d4f61ddbbbbc5dbb06c87139d
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.12
Status affected
Version < 5.12
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.089
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String