CVE-2025-38404
usb: typec: displayport: Fix potential deadlock
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: usb: typec: displayport: Fix potential deadlock The deadlock can occur due to a recursive lock acquisition of `cros_typec_altmode_data::mutex`. The call chain is as follows: 1. cros_typec_altmode_work() acquires the mutex 2. typec_altmode_vdm() -> dp_altmode_vdm() -> 3. typec_altmode_exit() -> cros_typec_altmode_exit() 4. cros_typec_altmode_exit() attempts to acquire the mutex again To prevent this, defer the `typec_altmode_exit()` call by scheduling it rather than calling it directly from within the mutex-protected context.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jul 25, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
e0359c66c1beccbe90119a63391678eabda38007 < 749d9076735fb497aae60fbea9fff563f9ea3254 e3fb6c2c3939b4aad203cacdd613a62ce1fd032c < eb08fca56f1f39e4038cb9bac9864464b13b00aa 56846793f105cf2b39ecbde4f3ae86342091f6fc < 7be0d1ea71f52595499da39cea484a895e8ed042 8e8a69b1f8c59f0505f8a1c0fb77191f27b75011 < 76cf1f33e7319fe74c94ac92f9814094ee8cc84b 8851e40587013db00b71d4aeaae30f5fd59b0eec < 63cff9f57e86b2dc25d7487ca0118df89a665296 10cc2cfd3e5d0e0ec7590c4bee8bcea10e5492c4 < c782f98eef14197affa8a7b91e6981420f109ea9 8f6a4fa7b663468bb304cb885b93326e025ae005 < 80c25d7916a44715338d4f8924c8e52af50d0b9f b4b38ffb38c91afd4dc387608db26f6fc34ed40b < 099cf1fbb8afc3771f408109f62bdec66f85160e
Linux / Linux
6.1.143 < 6.1.144 6.6.96 < 6.6.97 6.12.36 < 6.12.37 6.15.5 < 6.15.6
References
git.kernel.org: https://git.kernel.org/stable/c/749d9076735fb497aae60fbea9fff563f9ea3254 git.kernel.org: https://git.kernel.org/stable/c/eb08fca56f1f39e4038cb9bac9864464b13b00aa git.kernel.org: https://git.kernel.org/stable/c/7be0d1ea71f52595499da39cea484a895e8ed042 git.kernel.org: https://git.kernel.org/stable/c/76cf1f33e7319fe74c94ac92f9814094ee8cc84b git.kernel.org: https://git.kernel.org/stable/c/63cff9f57e86b2dc25d7487ca0118df89a665296 git.kernel.org: https://git.kernel.org/stable/c/c782f98eef14197affa8a7b91e6981420f109ea9 git.kernel.org: https://git.kernel.org/stable/c/80c25d7916a44715338d4f8924c8e52af50d0b9f git.kernel.org: https://git.kernel.org/stable/c/099cf1fbb8afc3771f408109f62bdec66f85160e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html