-
CVE-2025-38583
- EPSS 0.04%
- Veröffentlicht 19.08.2025 17:15:35
- Zuletzt bearbeitet 28.08.2025 15:15:54
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: clk: xilinx: vcu: unregister pll_post only if registered correctly If registration of pll_post is failed, it will be set to NULL or ERR, unregistering same will fail with following call trace: Unable to handle kernel NULL pointer dereference at virtual address 008 pc : clk_hw_unregister+0xc/0x20 lr : clk_hw_unregister_fixed_factor+0x18/0x30 sp : ffff800011923850 ... Call trace: clk_hw_unregister+0xc/0x20 clk_hw_unregister_fixed_factor+0x18/0x30 xvcu_unregister_clock_provider+0xcc/0xf4 [xlnx_vcu] xvcu_probe+0x2bc/0x53c [xlnx_vcu]
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
7e903da71f8bec4beb7c06707900e1ed8db843ca
Version
4472e1849db7f719bbf625890096e0269b5849fe
Status
affected
Version <
88bd875b7f9c3652c27d6e4bb7a23701b764f762
Version
4472e1849db7f719bbf625890096e0269b5849fe
Status
affected
Version <
51990eecf22f446550befdfd1a9f54147eafd636
Version
4472e1849db7f719bbf625890096e0269b5849fe
Status
affected
Version <
f1a1be99d5ae53d3b404415f1665eb59e8e02a8c
Version
4472e1849db7f719bbf625890096e0269b5849fe
Status
affected
Version <
86124c5cfceb5ac04d2fddbf1b6f7147332d96a3
Version
4472e1849db7f719bbf625890096e0269b5849fe
Status
affected
Version <
a72b1c2d3b53e088bfaeb593949ff6fbd2cbe8ed
Version
4472e1849db7f719bbf625890096e0269b5849fe
Status
affected
Version <
3b0abc443ac22f7d4f61ddbbbbc5dbb06c87139d
Version
4472e1849db7f719bbf625890096e0269b5849fe
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.12
Status
affected
Version <
5.12
Version
0
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.148
Status
unaffected
Version <=
6.6.*
Version
6.6.102
Status
unaffected
Version <=
6.12.*
Version
6.12.42
Status
unaffected
Version <=
6.15.*
Version
6.15.10
Status
unaffected
Version <=
6.16.*
Version
6.16.1
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.089 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|