CVE-2025-38404
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/07/2025
Last modified:
23/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: typec: displayport: Fix potential deadlock<br />
<br />
The deadlock can occur due to a recursive lock acquisition of<br />
`cros_typec_altmode_data::mutex`.<br />
The call chain is as follows:<br />
1. cros_typec_altmode_work() acquires the mutex<br />
2. typec_altmode_vdm() -> dp_altmode_vdm() -><br />
3. typec_altmode_exit() -> cros_typec_altmode_exit()<br />
4. cros_typec_altmode_exit() attempts to acquire the mutex again<br />
<br />
To prevent this, defer the `typec_altmode_exit()` call by scheduling<br />
it rather than calling it directly from within the mutex-protected<br />
context.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:6.1.143:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.6.96:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12.36:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/099cf1fbb8afc3771f408109f62bdec66f85160e
- https://git.kernel.org/stable/c/63cff9f57e86b2dc25d7487ca0118df89a665296
- https://git.kernel.org/stable/c/749d9076735fb497aae60fbea9fff563f9ea3254
- https://git.kernel.org/stable/c/76cf1f33e7319fe74c94ac92f9814094ee8cc84b
- https://git.kernel.org/stable/c/7be0d1ea71f52595499da39cea484a895e8ed042
- https://git.kernel.org/stable/c/80c25d7916a44715338d4f8924c8e52af50d0b9f
- https://git.kernel.org/stable/c/c782f98eef14197affa8a7b91e6981420f109ea9
- https://git.kernel.org/stable/c/eb08fca56f1f39e4038cb9bac9864464b13b00aa
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



