CVE-2025-38649

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38649
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38649.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38649
Downstream
Published
2025-08-22T16:00:53.731Z
Modified
2025-11-27T02:33:27.896732Z
Summary
arm64: dts: qcom: qcs615: fix a crash issue caused by infinite loop for Coresight
Details

In the Linux kernel, the following vulnerability has been resolved:

arm64: dts: qcom: qcs615: fix a crash issue caused by infinite loop for Coresight

An infinite loop has been created by the Coresight devices. When only a source device is enabled, the coresightfindactivatedsysfssink function is recursively invoked in an attempt to locate an active sink device, ultimately leading to a stack overflow and system crash. Therefore, disable the replicator1 to break the infinite loop and prevent a potential stack overflow.

replicator1out -> funnelswaoin6 -> tmcetfswaoin -> tmcetfswaoout | | replicator1in replicatorswaoin | | replicator0out1 replicatorswaoout0 | | replicator0in funnelin1in3 | | tmcetfout <- tmcetfin <- funnelmergout <- funnelmergin1 <- funnelin1out

[call trace] dumpbacktrace+0x9c/0x128 showstack+0x20/0x38 dumpstacklvl+0x48/0x60 dumpstack+0x18/0x28 panic+0x340/0x3b0 nmipanic+0x94/0xa0 panicbadstack+0x114/0x138 handlebadstack+0x34/0xb8 _badstack+0x78/0x80 coresightfindactivatedsysfssink+0x28/0xa0 [coresight] coresightfindactivatedsysfssink+0x5c/0xa0 [coresight] coresightfindactivatedsysfssink+0x5c/0xa0 [coresight] coresightfindactivatedsysfssink+0x5c/0xa0 [coresight] coresightfindactivatedsysfssink+0x5c/0xa0 [coresight] ... coresightfindactivatedsysfssink+0x5c/0xa0 [coresight] coresightenablesysfs+0x80/0x2a0 [coresight]

side effect after the change: Only trace data originating from AOSS can reach the ETF_SWAO and EUD sinks.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/cc431b3424123d84bcd7afd4de150b33f117a8ef/cves/2025/38xxx/CVE-2025-38649.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bf469630552a3950d0370dd5fd1f9bf0145d09d5
Fixed
a9aaadcb0a6ce0c19616c46525112bc947c6f2b1
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bf469630552a3950d0370dd5fd1f9bf0145d09d5
Fixed
fbe5be7893b8c7f58c999a26839cd30bc07654c6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bf469630552a3950d0370dd5fd1f9bf0145d09d5
Fixed
bd4f35786d5f0798cc1f8c187a81a7c998e6c58f

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.14.0
Fixed
6.15.10
Type
ECOSYSTEM
Events
Introduced
6.16.0
Fixed
6.16.1