๐Ÿ” CVE Alert

CVE-2025-38623

UNKNOWN 0.0

PCI: pnv_php: Fix surprise plug detection and recovery

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: PCI: pnv_php: Fix surprise plug detection and recovery The existing PowerNV hotplug code did not handle surprise plug events correctly, leading to a complete failure of the hotplug system after device removal and a required reboot to detect new devices. This comes down to two issues: 1) When a device is surprise removed, often the bridge upstream port will cause a PE freeze on the PHB. If this freeze is not cleared, the MSI interrupts from the bridge hotplug notification logic will not be received by the kernel, stalling all plug events on all slots associated with the PE. 2) When a device is removed from a slot, regardless of surprise or programmatic removal, the associated PHB/PE ls left frozen. If this freeze is not cleared via a fundamental reset, skiboot is unable to clear the freeze and cannot retrain / rescan the slot. This also requires a reboot to clear the freeze and redetect the device in the slot. Issue the appropriate unfreeze and rescan commands on hotplug events, and don't oops on hotplug if pci_bus_to_OF_node() returns NULL. [bhelgaas: tidy comments]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 22, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
360aebd85a4c946764f6301d68de2a817fad5159 < 6e7b5f922901585b8f11e0d6cda12bda5c59fc8a 360aebd85a4c946764f6301d68de2a817fad5159 < 2ec8ec57bb8ebde3e2a015eff80e5d66e6634fe3 360aebd85a4c946764f6301d68de2a817fad5159 < 473999ba937eac9776be791deed7c84a21d7880b 360aebd85a4c946764f6301d68de2a817fad5159 < 6e7b24c71e530a6c1d656e73d8a30ee081656844 360aebd85a4c946764f6301d68de2a817fad5159 < 48c6935a34981bb56f35be0774ec1f30c6e386f8 360aebd85a4c946764f6301d68de2a817fad5159 < 1d2f63680c5719a5da92639e981c6c9a87fcee08 360aebd85a4c946764f6301d68de2a817fad5159 < 78d20b8c13075eae3d884c21db7a09a6bbdda5b2 360aebd85a4c946764f6301d68de2a817fad5159 < a2a2a6fc2469524caa713036297c542746d148dc
Linux / Linux
4.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/6e7b5f922901585b8f11e0d6cda12bda5c59fc8a git.kernel.org: https://git.kernel.org/stable/c/2ec8ec57bb8ebde3e2a015eff80e5d66e6634fe3 git.kernel.org: https://git.kernel.org/stable/c/473999ba937eac9776be791deed7c84a21d7880b git.kernel.org: https://git.kernel.org/stable/c/6e7b24c71e530a6c1d656e73d8a30ee081656844 git.kernel.org: https://git.kernel.org/stable/c/48c6935a34981bb56f35be0774ec1f30c6e386f8 git.kernel.org: https://git.kernel.org/stable/c/1d2f63680c5719a5da92639e981c6c9a87fcee08 git.kernel.org: https://git.kernel.org/stable/c/78d20b8c13075eae3d884c21db7a09a6bbdda5b2 git.kernel.org: https://git.kernel.org/stable/c/a2a2a6fc2469524caa713036297c542746d148dc lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html