CVE-2025-38419 (GCVE-0-2025-38419)
Vulnerability from cvelistv5
Published
2025-07-25 14:05
Modified
2025-07-28 04:21
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach() When rproc->state = RPROC_DETACHED and rproc_attach() is used to attach to the remote processor, if rproc_handle_resources() returns a failure, the resources allocated by imx_rproc_prepare() should be released, otherwise the following memory leak will occur. Since almost the same thing is done in imx_rproc_prepare() and rproc_resource_cleanup(), Function rproc_resource_cleanup() is able to deal with empty lists so it is better to fix the "goto" statements in rproc_attach(). replace the "unprepare_device" goto statement with "clean_up_resources" and get rid of the "unprepare_device" label. unreferenced object 0xffff0000861c5d00 (size 128): comm "kworker/u12:3", pid 59, jiffies 4294893509 (age 149.220s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 02 88 00 00 00 00 00 00 10 00 00 00 00 00 ............ backtrace: [<00000000f949fe18>] slab_post_alloc_hook+0x98/0x37c [<00000000adbfb3e7>] __kmem_cache_alloc_node+0x138/0x2e0 [<00000000521c0345>] kmalloc_trace+0x40/0x158 [<000000004e330a49>] rproc_mem_entry_init+0x60/0xf8 [<000000002815755e>] imx_rproc_prepare+0xe0/0x180 [<0000000003f61b4e>] rproc_boot+0x2ec/0x528 [<00000000e7e994ac>] rproc_add+0x124/0x17c [<0000000048594076>] imx_rproc_probe+0x4ec/0x5d4 [<00000000efc298a1>] platform_probe+0x68/0xd8 [<00000000110be6fe>] really_probe+0x110/0x27c [<00000000e245c0ae>] __driver_probe_device+0x78/0x12c [<00000000f61f6f5e>] driver_probe_device+0x3c/0x118 [<00000000a7874938>] __device_attach_driver+0xb8/0xf8 [<0000000065319e69>] bus_for_each_drv+0x84/0xe4 [<00000000db3eb243>] __device_attach+0xfc/0x18c [<0000000072e4e1a4>] device_initial_probe+0x14/0x20
Impacted products
Vendor Product Version
Linux Linux Version: 10a3d4079eaea06472f1981152e2840e7232ffa9
Version: 10a3d4079eaea06472f1981152e2840e7232ffa9
Version: 10a3d4079eaea06472f1981152e2840e7232ffa9
Version: 10a3d4079eaea06472f1981152e2840e7232ffa9
Version: 10a3d4079eaea06472f1981152e2840e7232ffa9
Version: 10a3d4079eaea06472f1981152e2840e7232ffa9
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/remoteproc/remoteproc_core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "c56d6ef2711ee51b54f160ad0f25a381561f0287",
              "status": "affected",
              "version": "10a3d4079eaea06472f1981152e2840e7232ffa9",
              "versionType": "git"
            },
            {
              "lessThan": "82208ce9505abb057afdece7c62a14687c52c9ca",
              "status": "affected",
              "version": "10a3d4079eaea06472f1981152e2840e7232ffa9",
              "versionType": "git"
            },
            {
              "lessThan": "9515d74c9d1ae7308a02e8bd4f894eb8137cf8df",
              "status": "affected",
              "version": "10a3d4079eaea06472f1981152e2840e7232ffa9",
              "versionType": "git"
            },
            {
              "lessThan": "92776ca0ccfe78b9bfe847af206bad641fb11121",
              "status": "affected",
              "version": "10a3d4079eaea06472f1981152e2840e7232ffa9",
              "versionType": "git"
            },
            {
              "lessThan": "5434d9f2fd68722b514c14b417b53a8af02c4d24",
              "status": "affected",
              "version": "10a3d4079eaea06472f1981152e2840e7232ffa9",
              "versionType": "git"
            },
            {
              "lessThan": "7692c9fbedd9087dc9050903f58095915458d9b1",
              "status": "affected",
              "version": "10a3d4079eaea06472f1981152e2840e7232ffa9",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/remoteproc/remoteproc_core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.13"
            },
            {
              "lessThan": "5.13",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.186",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.142",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.95",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.35",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.15.*",
              "status": "unaffected",
              "version": "6.15.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.16",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.186",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.142",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.95",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.35",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15.4",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.16",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()\n\nWhen rproc-\u003estate = RPROC_DETACHED and rproc_attach() is used\nto attach to the remote processor, if rproc_handle_resources()\nreturns a failure, the resources allocated by imx_rproc_prepare()\nshould be released, otherwise the following memory leak will occur.\n\nSince almost the same thing is done in imx_rproc_prepare() and\nrproc_resource_cleanup(), Function rproc_resource_cleanup() is able\nto deal with empty lists so it is better to fix the \"goto\" statements\nin rproc_attach(). replace the \"unprepare_device\" goto statement with\n\"clean_up_resources\" and get rid of the \"unprepare_device\" label.\n\nunreferenced object 0xffff0000861c5d00 (size 128):\ncomm \"kworker/u12:3\", pid 59, jiffies 4294893509 (age 149.220s)\nhex dump (first 32 bytes):\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n00 00 02 88 00 00 00 00 00 00 10 00 00 00 00 00 ............\nbacktrace:\n [\u003c00000000f949fe18\u003e] slab_post_alloc_hook+0x98/0x37c\n [\u003c00000000adbfb3e7\u003e] __kmem_cache_alloc_node+0x138/0x2e0\n [\u003c00000000521c0345\u003e] kmalloc_trace+0x40/0x158\n [\u003c000000004e330a49\u003e] rproc_mem_entry_init+0x60/0xf8\n [\u003c000000002815755e\u003e] imx_rproc_prepare+0xe0/0x180\n [\u003c0000000003f61b4e\u003e] rproc_boot+0x2ec/0x528\n [\u003c00000000e7e994ac\u003e] rproc_add+0x124/0x17c\n [\u003c0000000048594076\u003e] imx_rproc_probe+0x4ec/0x5d4\n [\u003c00000000efc298a1\u003e] platform_probe+0x68/0xd8\n [\u003c00000000110be6fe\u003e] really_probe+0x110/0x27c\n [\u003c00000000e245c0ae\u003e] __driver_probe_device+0x78/0x12c\n [\u003c00000000f61f6f5e\u003e] driver_probe_device+0x3c/0x118\n [\u003c00000000a7874938\u003e] __device_attach_driver+0xb8/0xf8\n [\u003c0000000065319e69\u003e] bus_for_each_drv+0x84/0xe4\n [\u003c00000000db3eb243\u003e] __device_attach+0xfc/0x18c\n [\u003c0000000072e4e1a4\u003e] device_initial_probe+0x14/0x20"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-28T04:21:40.713Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/c56d6ef2711ee51b54f160ad0f25a381561f0287"
        },
        {
          "url": "https://git.kernel.org/stable/c/82208ce9505abb057afdece7c62a14687c52c9ca"
        },
        {
          "url": "https://git.kernel.org/stable/c/9515d74c9d1ae7308a02e8bd4f894eb8137cf8df"
        },
        {
          "url": "https://git.kernel.org/stable/c/92776ca0ccfe78b9bfe847af206bad641fb11121"
        },
        {
          "url": "https://git.kernel.org/stable/c/5434d9f2fd68722b514c14b417b53a8af02c4d24"
        },
        {
          "url": "https://git.kernel.org/stable/c/7692c9fbedd9087dc9050903f58095915458d9b1"
        }
      ],
      "title": "remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-38419",
    "datePublished": "2025-07-25T14:05:43.741Z",
    "dateReserved": "2025-04-16T04:51:24.014Z",
    "dateUpdated": "2025-07-28T04:21:40.713Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-38419\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-07-25T14:15:33.727\",\"lastModified\":\"2025-07-25T15:29:19.837\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nremoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()\\n\\nWhen rproc-\u003estate = RPROC_DETACHED and rproc_attach() is used\\nto attach to the remote processor, if rproc_handle_resources()\\nreturns a failure, the resources allocated by imx_rproc_prepare()\\nshould be released, otherwise the following memory leak will occur.\\n\\nSince almost the same thing is done in imx_rproc_prepare() and\\nrproc_resource_cleanup(), Function rproc_resource_cleanup() is able\\nto deal with empty lists so it is better to fix the \\\"goto\\\" statements\\nin rproc_attach(). replace the \\\"unprepare_device\\\" goto statement with\\n\\\"clean_up_resources\\\" and get rid of the \\\"unprepare_device\\\" label.\\n\\nunreferenced object 0xffff0000861c5d00 (size 128):\\ncomm \\\"kworker/u12:3\\\", pid 59, jiffies 4294893509 (age 149.220s)\\nhex dump (first 32 bytes):\\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\\n00 00 02 88 00 00 00 00 00 00 10 00 00 00 00 00 ............\\nbacktrace:\\n [\u003c00000000f949fe18\u003e] slab_post_alloc_hook+0x98/0x37c\\n [\u003c00000000adbfb3e7\u003e] __kmem_cache_alloc_node+0x138/0x2e0\\n [\u003c00000000521c0345\u003e] kmalloc_trace+0x40/0x158\\n [\u003c000000004e330a49\u003e] rproc_mem_entry_init+0x60/0xf8\\n [\u003c000000002815755e\u003e] imx_rproc_prepare+0xe0/0x180\\n [\u003c0000000003f61b4e\u003e] rproc_boot+0x2ec/0x528\\n [\u003c00000000e7e994ac\u003e] rproc_add+0x124/0x17c\\n [\u003c0000000048594076\u003e] imx_rproc_probe+0x4ec/0x5d4\\n [\u003c00000000efc298a1\u003e] platform_probe+0x68/0xd8\\n [\u003c00000000110be6fe\u003e] really_probe+0x110/0x27c\\n [\u003c00000000e245c0ae\u003e] __driver_probe_device+0x78/0x12c\\n [\u003c00000000f61f6f5e\u003e] driver_probe_device+0x3c/0x118\\n [\u003c00000000a7874938\u003e] __device_attach_driver+0xb8/0xf8\\n [\u003c0000000065319e69\u003e] bus_for_each_drv+0x84/0xe4\\n [\u003c00000000db3eb243\u003e] __device_attach+0xfc/0x18c\\n [\u003c0000000072e4e1a4\u003e] device_initial_probe+0x14/0x20\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/5434d9f2fd68722b514c14b417b53a8af02c4d24\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7692c9fbedd9087dc9050903f58095915458d9b1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/82208ce9505abb057afdece7c62a14687c52c9ca\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/92776ca0ccfe78b9bfe847af206bad641fb11121\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9515d74c9d1ae7308a02e8bd4f894eb8137cf8df\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c56d6ef2711ee51b54f160ad0f25a381561f0287\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…