Wind River Support Network

HomeDefectsLIN1022-16115
Acknowledged

LIN1022-16115 : Security Advisory - linux - CVE-2025-38005

Created: Jun 19, 2025    Updated: Jun 20, 2025
Found In Version: 10.22.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 22
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]dmaengine: ti: k3-udma: Add missing locking[EOL][EOL]Recent kernels complain about a missing lock in k3-udma.c when the lock[EOL]validator is enabled:[EOL][EOL][    4.128073] WARNING: CPU: 0 PID: 746 at drivers/dma/ti/../virt-dma.h:169 udma_start.isra.0+0x34/0x238[EOL][    4.137352] CPU: 0 UID: 0 PID: 746 Comm: kworker/0:3 Not tainted 6.12.9-arm64 #28[EOL][    4.144867] Hardware name: pp-v12 (DT)[EOL][    4.148648] Workqueue: events udma_check_tx_completion[EOL][    4.153841] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)[EOL][    4.160834] pc : udma_start.isra.0+0x34/0x238[EOL][    4.165227] lr : udma_start.isra.0+0x30/0x238[EOL][    4.169618] sp : ffffffc083cabcf0[EOL][    4.172963] x29: ffffffc083cabcf0 x28: 0000000000000000 x27: ffffff800001b005[EOL][    4.180167] x26: ffffffc0812f0000 x25: 0000000000000000 x24: 0000000000000000[EOL][    4.187370] x23: 0000000000000001 x22: 00000000e21eabe9 x21: ffffff8000fa0670[EOL][    4.194571] x20: ffffff8001b6bf00 x19: ffffff8000fa0430 x18: ffffffc083b95030[EOL][    4.201773] x17: 0000000000000000 x16: 00000000f0000000 x15: 0000000000000048[EOL][    4.208976] x14: 0000000000000048 x13: 0000000000000000 x12: 0000000000000001[EOL][    4.216179] x11: ffffffc08151a240 x10: 0000000000003ea1 x9 : ffffffc08046ab68[EOL][    4.223381] x8 : ffffffc083cabac0 x7 : ffffffc081df3718 x6 : 0000000000029fc8[EOL][    4.230583] x5 : ffffffc0817ee6d8 x4 : 0000000000000bc0 x3 : 0000000000000000[EOL][    4.237784] x2 : 0000000000000000 x1 : 00000000001fffff x0 : 0000000000000000[EOL][    4.244986] Call trace:[EOL][    4.247463]  udma_start.isra.0+0x34/0x238[EOL][    4.251509]  udma_check_tx_completion+0xd0/0xdc[EOL][    4.256076]  process_one_work+0x244/0x3fc[EOL][    4.260129]  process_scheduled_works+0x6c/0x74[EOL][    4.264610]  worker_thread+0x150/0x1dc[EOL][    4.268398]  kthread+0xd8/0xe8[EOL][    4.271492]  ret_from_fork+0x10/0x20[EOL][    4.275107] irq event stamp: 220[EOL][    4.278363] hardirqs last  enabled at (219): [<ffffffc080a27c7c>] _raw_spin_unlock_irq+0x38/0x50[EOL][    4.287183] hardirqs last disabled at (220): [<ffffffc080a1c154>] el1_dbg+0x24/0x50[EOL][    4.294879] softirqs last  enabled at (182): [<ffffffc080037e68>] handle_softirqs+0x1c0/0x3cc[EOL][    4.303437] softirqs last disabled at (177): [<ffffffc080010170>] __do_softirq+0x1c/0x28[EOL][    4.311559] ---[ end trace 0000000000000000 ]---[EOL][EOL]This commit adds the missing locking.

CREATE(Triage):(User=lchen-cn) [CVE-2025-38005 (https://nvd.nist.gov/vuln/detail/CVE-2025-38005)
Live chat
Online