In the Linux kernel, the following vulnerability has been resolved:
clk: xilinx: vcu: unregister pll_post only if registered correctly
If registration of pll_post is failed, it will be set to NULL or ERR, unregistering same will fail with following call trace:
Unable to handle kernel NULL pointer dereference at virtual address 008 pc : clkhwunregister+0xc/0x20 lr : clkhwunregisterfixedfactor+0x18/0x30 sp : ffff800011923850 ... Call trace: clkhwunregister+0xc/0x20 clkhwunregisterfixedfactor+0x18/0x30 xvcuunregisterclockprovider+0xcc/0xf4 [xlnxvcu] xvcuprobe+0x2bc/0x53c [xlnxvcu]
[
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"171301621276504485393758037242857065889",
"243123960453099536551681071479587539992",
"228926165412720671127740568667768270773",
"48818494947548999801499235414229893911"
]
},
"target": {
"file": "drivers/clk/xilinx/xlnx_vcu.c"
},
"id": "CVE-2025-38583-5caccb5c",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a72b1c2d3b53e088bfaeb593949ff6fbd2cbe8ed",
"signature_type": "Line"
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "120873164208476296493257054286076434748",
"length": 491.0
},
"target": {
"function": "xvcu_unregister_clock_provider",
"file": "drivers/clk/xilinx/xlnx_vcu.c"
},
"id": "CVE-2025-38583-9b22ba66",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a72b1c2d3b53e088bfaeb593949ff6fbd2cbe8ed",
"signature_type": "Function"
}
]