-

CVE-2025-38583

In the Linux kernel, the following vulnerability has been resolved:

clk: xilinx: vcu: unregister pll_post only if registered correctly

If registration of pll_post is failed, it will be set to NULL or ERR,
unregistering same will fail with following call trace:

Unable to handle kernel NULL pointer dereference at virtual address 008
pc : clk_hw_unregister+0xc/0x20
lr : clk_hw_unregister_fixed_factor+0x18/0x30
sp : ffff800011923850
...
Call trace:
 clk_hw_unregister+0xc/0x20
 clk_hw_unregister_fixed_factor+0x18/0x30
 xvcu_unregister_clock_provider+0xcc/0xf4 [xlnx_vcu]
 xvcu_probe+0x2bc/0x53c [xlnx_vcu]

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 7e903da71f8bec4beb7c06707900e1ed8db843ca
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
Version < 88bd875b7f9c3652c27d6e4bb7a23701b764f762
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
Version < 51990eecf22f446550befdfd1a9f54147eafd636
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
Version < f1a1be99d5ae53d3b404415f1665eb59e8e02a8c
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
Version < 86124c5cfceb5ac04d2fddbf1b6f7147332d96a3
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
Version < a72b1c2d3b53e088bfaeb593949ff6fbd2cbe8ed
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
Version < 3b0abc443ac22f7d4f61ddbbbbc5dbb06c87139d
Version 4472e1849db7f719bbf625890096e0269b5849fe
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.12
Status affected
Version < 5.12
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.089
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string