Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-65931.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-65931
Upstream
Published
2025-07-28T12:15:30Z
Modified
2026-04-01T05:20:40.135358Z
Summary
CVE-2025-38487 affecting package kernel for versions less than 6.6.104.2-1
Details

In the Linux kernel, the following vulnerability has been resolved:

soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled

Mitigate e.g. the following:

# echo 1e789080.lpc-snoop > /sys/bus/platform/drivers/aspeed-lpc-snoop/unbind
...
[  120.363594] Unable to handle kernel NULL pointer dereference at virtual address 00000004 when write
[  120.373866] [00000004] *pgd=00000000
[  120.377910] Internal error: Oops: 805 [#1] SMP ARM
[  120.383306] CPU: 1 UID: 0 PID: 315 Comm: sh Not tainted 6.15.0-rc1-00009-g926217bc7d7d-dirty #20 NONE
...
[  120.679543] Call trace:
[  120.679559]  misc_deregister from aspeed_lpc_snoop_remove+0x84/0xac
[  120.692462]  aspeed_lpc_snoop_remove from platform_remove+0x28/0x38
[  120.700996]  platform_remove from device_release_driver_internal+0x188/0x200
...
References

Affected packages

Azure Linux:3 / kernel

Package

Name
kernel
Purl
pkg:rpm/azure-linux/kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.104.2-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-65931.json"