CVE-2025-38631
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/08/2025
Last modified:
26/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
clk: imx95-blk-ctl: Fix synchronous abort<br />
<br />
When enabling runtime PM for clock suppliers that also belong to a power<br />
domain, the following crash is thrown:<br />
error: synchronous external abort: 0000000096000010 [#1] PREEMPT SMP<br />
Workqueue: events_unbound deferred_probe_work_func<br />
pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br />
pc : clk_mux_get_parent+0x60/0x90<br />
lr : clk_core_reparent_orphans_nolock+0x58/0xd8<br />
Call trace:<br />
clk_mux_get_parent+0x60/0x90<br />
clk_core_reparent_orphans_nolock+0x58/0xd8<br />
of_clk_add_hw_provider.part.0+0x90/0x100<br />
of_clk_add_hw_provider+0x1c/0x38<br />
imx95_bc_probe+0x2e0/0x3f0<br />
platform_probe+0x70/0xd8<br />
<br />
Enabling runtime PM without explicitly resuming the device caused<br />
the power domain cut off after clk_register() is called. As a result,<br />
a crash happens when the clock hardware provider is added and attempts<br />
to access the BLK_CTL register.<br />
<br />
Fix this by using devm_pm_runtime_enable() instead of pm_runtime_enable()<br />
and getting rid of the pm_runtime_disable() in the cleanup path.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.10 (including) | 6.12.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



