CVE-2025-38619

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38619
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38619.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38619
Downstream
Published
2025-08-22T16:00:23.564Z
Modified
2025-11-27T19:35:03.126530Z
Summary
media: ti: j721e-csi2rx: fix list_del corruption
Details

In the Linux kernel, the following vulnerability has been resolved:

media: ti: j721e-csi2rx: fix list_del corruption

If ticsi2rxstartdma() fails in ticsi2rxdmacallback(), the buffer is marked done with VB2BUFSTATEERROR but is not removed from the DMA queue. This causes the same buffer to be retried in the next iteration, resulting in a double listdel() and eventual list corruption.

Fix this by removing the buffer from the queue before calling vb2bufferdone() on error.

This resolves a crash due to listdel corruption: [ 37.811243] j721e-csi2rx 30102000.ticsi2rx: Failed to queue the next buffer for DMA [ 37.832187] slab kmalloc-2k start ffff00000255b000 pointer offset 1064 size 2048 [ 37.839761] listdel corruption. next->prev should be ffff00000255bc28, but was ffff00000255d428. (next=ffff00000255b428) [ 37.850799] ------------[ cut here ]------------ [ 37.855424] kernel BUG at lib/listdebug.c:65! [ 37.859876] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP [ 37.866061] Modules linked in: i2cdev usbfrndis uether libcomposite dwc3 udccore usbcommon aesceblk aescecipher ghashce gf128mul sha1ce cpufreqdt dwc3am62 phygmiisel sa2ul [ 37.882830] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.16.0-rc3+ #28 VOLUNTARY [ 37.890851] Hardware name: Bosch STLA-GSRV2-B0 (DT) [ 37.895737] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 37.902703] pc : listdelentryvalidorreport+0xdc/0x114 [ 37.908390] lr : _listdelentryvalidorreport+0xdc/0x114 [ 37.914059] sp : ffff800080003db0 [ 37.917375] x29: ffff800080003db0 x28: 0000000000000007 x27: ffff800080e50000 [ 37.924521] x26: 0000000000000000 x25: ffff0000016abb50 x24: dead000000000122 [ 37.931666] x23: ffff0000016abb78 x22: ffff0000016ab080 x21: ffff800080003de0 [ 37.938810] x20: ffff00000255bc00 x19: ffff00000255b800 x18: 000000000000000a [ 37.945956] x17: 20747562202c3832 x16: 6362353532303030 x15: 0720072007200720 [ 37.953101] x14: 0720072007200720 x13: 0720072007200720 x12: 00000000ffffffea [ 37.960248] x11: ffff800080003b18 x10: 00000000ffffefff x9 : ffff800080f5b568 [ 37.967396] x8 : ffff800080f5b5c0 x7 : 0000000000017fe8 x6 : c0000000ffffefff [ 37.974542] x5 : ffff00000fea6688 x4 : 0000000000000000 x3 : 0000000000000000 [ 37.981686] x2 : 0000000000000000 x1 : ffff800080ef2b40 x0 : 000000000000006d [ 37.988832] Call trace: [ 37.991281] _listdelentryvalidorreport+0xdc/0x114 (P) [ 37.996959] ticsi2rxdmacallback+0x84/0x1c4 [ 38.001419] udmavchancomplete+0x1e0/0x344 [ 38.005705] taskletactioncommon+0x118/0x310 [ 38.010163] taskletaction+0x30/0x3c [ 38.013832] handlesoftirqs+0x10c/0x2e0 [ 38.017761] _dosoftirq+0x14/0x20 [ 38.021256] _dosoftirq+0x10/0x20 [ 38.024931] callonirqstack+0x24/0x60 [ 38.028873] dosoftirqownstack+0x1c/0x40 [ 38.033064] _irqexitrcu+0x130/0x15c [ 38.036909] irqexitrcu+0x10/0x20 [ 38.040403] el1interrupt+0x38/0x60 [ 38.043987] el1h64irqhandler+0x18/0x24 [ 38.048091] el1h64irq+0x6c/0x70 [ 38.051501] defaultidlecall+0x34/0xe0 (P) [ 38.055783] doidle+0x1f8/0x250 [ 38.059021] cpustartupentry+0x34/0x3c [ 38.062951] restinit+0xb4/0xc0 [ 38.066186] consoleonrootfs+0x0/0x6c [ 38.070031] _primaryswitched+0x88/0x90 [ 38.074059] Code: b00037e0 91378000 f9400462 97e9bf49 (d4210000) [ 38.080168] ---[ end trace 0000000000000000 ]--- [ 38.084795] Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt [ 38.092197] SMP: stopping secondary CPUs [ 38.096139] Kernel Offset: disabled [ 38.099631] CPU features: 0x0000,00002000,02000801,0400420b [ 38.105202] Memory Limit: none [ 38.108260] ---[ end Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt ]---

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/ee626f5d79d5817bb21d6f048dc0da4c4e383443/cves/2025/38xxx/CVE-2025-38619.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b4a3d877dc92963a4db16ddb71df3d333c0d40bd
Fixed
68e5579f4de12207b23c41b44a4c0778b6c2858f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b4a3d877dc92963a4db16ddb71df3d333c0d40bd
Fixed
92d0188f36ca8082af7989d743eb5b44c2d259f7
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b4a3d877dc92963a4db16ddb71df3d333c0d40bd
Fixed
a4a8cb0889927d59ebd839458c8f038bc5298ef9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b4a3d877dc92963a4db16ddb71df3d333c0d40bd
Fixed
ae42c6fe531425ef2f47e82f96851427d24bbf6b

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.42
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.10
Type
ECOSYSTEM
Events
Introduced
6.16.0
Fixed
6.16.1