CVE-2025-38623
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/08/2025
Last modified:
07/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
PCI: pnv_php: Fix surprise plug detection and recovery<br />
<br />
The existing PowerNV hotplug code did not handle surprise plug events<br />
correctly, leading to a complete failure of the hotplug system after device<br />
removal and a required reboot to detect new devices.<br />
<br />
This comes down to two issues:<br />
<br />
1) When a device is surprise removed, often the bridge upstream<br />
port will cause a PE freeze on the PHB. If this freeze is not<br />
cleared, the MSI interrupts from the bridge hotplug notification<br />
logic will not be received by the kernel, stalling all plug events<br />
on all slots associated with the PE.<br />
<br />
2) When a device is removed from a slot, regardless of surprise or<br />
programmatic removal, the associated PHB/PE ls left frozen.<br />
If this freeze is not cleared via a fundamental reset, skiboot<br />
is unable to clear the freeze and cannot retrain / rescan the<br />
slot. This also requires a reboot to clear the freeze and redetect<br />
the device in the slot.<br />
<br />
Issue the appropriate unfreeze and rescan commands on hotplug events,<br />
and don&#39;t oops on hotplug if pci_bus_to_OF_node() returns NULL.<br />
<br />
[bhelgaas: tidy comments]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9 (including) | 5.10.241 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.190 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.148 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.102 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.1 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1d2f63680c5719a5da92639e981c6c9a87fcee08
- https://git.kernel.org/stable/c/2ec8ec57bb8ebde3e2a015eff80e5d66e6634fe3
- https://git.kernel.org/stable/c/473999ba937eac9776be791deed7c84a21d7880b
- https://git.kernel.org/stable/c/48c6935a34981bb56f35be0774ec1f30c6e386f8
- https://git.kernel.org/stable/c/6e7b24c71e530a6c1d656e73d8a30ee081656844
- https://git.kernel.org/stable/c/6e7b5f922901585b8f11e0d6cda12bda5c59fc8a
- https://git.kernel.org/stable/c/78d20b8c13075eae3d884c21db7a09a6bbdda5b2
- https://git.kernel.org/stable/c/a2a2a6fc2469524caa713036297c542746d148dc
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



