In the Linux kernel, the following vulnerability has been resolved:
clk: imx95-blk-ctl: Fix synchronous abort
When enabling runtime PM for clock suppliers that also belong to a power domain, the following crash is thrown: error: synchronous external abort: 0000000096000010 [#1] PREEMPT SMP Workqueue: eventsunbound deferredprobeworkfunc pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : clkmuxgetparent+0x60/0x90 lr : clkcorereparentorphansnolock+0x58/0xd8 Call trace: clkmuxgetparent+0x60/0x90 clkcorereparentorphansnolock+0x58/0xd8 ofclkaddhwprovider.part.0+0x90/0x100 ofclkaddhwprovider+0x1c/0x38 imx95bcprobe+0x2e0/0x3f0 platform_probe+0x70/0xd8
Enabling runtime PM without explicitly resuming the device caused the power domain cut off after clkregister() is called. As a result, a crash happens when the clock hardware provider is added and attempts to access the BLKCTL register.
Fix this by using devmpmruntimeenable() instead of pmruntimeenable() and getting rid of the pmruntime_disable() in the cleanup path.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/cc431b3424123d84bcd7afd4de150b33f117a8ef/cves/2025/38xxx/CVE-2025-38631.json"
}