๐Ÿ” CVE Alert

CVE-2025-38404

UNKNOWN 0.0

usb: typec: displayport: Fix potential deadlock

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: typec: displayport: Fix potential deadlock The deadlock can occur due to a recursive lock acquisition of `cros_typec_altmode_data::mutex`. The call chain is as follows: 1. cros_typec_altmode_work() acquires the mutex 2. typec_altmode_vdm() -> dp_altmode_vdm() -> 3. typec_altmode_exit() -> cros_typec_altmode_exit() 4. cros_typec_altmode_exit() attempts to acquire the mutex again To prevent this, defer the `typec_altmode_exit()` call by scheduling it rather than calling it directly from within the mutex-protected context.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 25, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
e0359c66c1beccbe90119a63391678eabda38007 < 749d9076735fb497aae60fbea9fff563f9ea3254 e3fb6c2c3939b4aad203cacdd613a62ce1fd032c < eb08fca56f1f39e4038cb9bac9864464b13b00aa 56846793f105cf2b39ecbde4f3ae86342091f6fc < 7be0d1ea71f52595499da39cea484a895e8ed042 8e8a69b1f8c59f0505f8a1c0fb77191f27b75011 < 76cf1f33e7319fe74c94ac92f9814094ee8cc84b 8851e40587013db00b71d4aeaae30f5fd59b0eec < 63cff9f57e86b2dc25d7487ca0118df89a665296 10cc2cfd3e5d0e0ec7590c4bee8bcea10e5492c4 < c782f98eef14197affa8a7b91e6981420f109ea9 8f6a4fa7b663468bb304cb885b93326e025ae005 < 80c25d7916a44715338d4f8924c8e52af50d0b9f b4b38ffb38c91afd4dc387608db26f6fc34ed40b < 099cf1fbb8afc3771f408109f62bdec66f85160e
Linux / Linux
6.1.143 < 6.1.144 6.6.96 < 6.6.97 6.12.36 < 6.12.37 6.15.5 < 6.15.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/749d9076735fb497aae60fbea9fff563f9ea3254 git.kernel.org: https://git.kernel.org/stable/c/eb08fca56f1f39e4038cb9bac9864464b13b00aa git.kernel.org: https://git.kernel.org/stable/c/7be0d1ea71f52595499da39cea484a895e8ed042 git.kernel.org: https://git.kernel.org/stable/c/76cf1f33e7319fe74c94ac92f9814094ee8cc84b git.kernel.org: https://git.kernel.org/stable/c/63cff9f57e86b2dc25d7487ca0118df89a665296 git.kernel.org: https://git.kernel.org/stable/c/c782f98eef14197affa8a7b91e6981420f109ea9 git.kernel.org: https://git.kernel.org/stable/c/80c25d7916a44715338d4f8924c8e52af50d0b9f git.kernel.org: https://git.kernel.org/stable/c/099cf1fbb8afc3771f408109f62bdec66f85160e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html