In the Linux kernel, the following vulnerability has been resolved:
remoteproc: core: Clear tablesz when rprocshutdown
There is case as below could trigger kernel dump: Use U-Boot to start remote processor(rproc) with resource table published to a fixed address by rproc. After Kernel boots up, stop the rproc, load a new firmware which doesn't have resource table ,and start rproc.
When starting rproc with a firmware not have resource table,
memcpy(loaded_table, rproc->cached_table, rproc->table_sz) will
trigger dump, because rproc->cachetable is set to NULL during the last
stop operation, but rproc->tablesz is still valid.
This issue is found on i.MX8MP and i.MX9.
Dump as below: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=000000010af63000 [0000000000000000] pgd=0000000000000000, p4d=0000000000000000 Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Modules linked in: CPU: 2 UID: 0 PID: 1060 Comm: sh Not tainted 6.14.0-rc7-next-20250317-dirty #38 Hardware name: NXP i.MX8MPlus EVK board (DT) pstate: a0000005 (NzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : _pimemcpygeneric+0x110/0x22c lr : rprocstart+0x88/0x1e0 Call trace: _pimemcpygeneric+0x110/0x22c (P) rprocboot+0x198/0x57c statestore+0x40/0x104 devattrstore+0x18/0x2c sysfskfwrite+0x7c/0x94 kernfsfopwriteiter+0x120/0x1cc vfswrite+0x240/0x378 ksyswrite+0x70/0x108 _arm64syswrite+0x1c/0x28 invokesyscall+0x48/0x10c el0svccommon.constprop.0+0xc0/0xe0 doel0svc+0x1c/0x28 el0svc+0x30/0xcc el0t64synchandler+0x10c/0x138 el0t64sync+0x198/0x19c
Clear rproc->table_sz to address the issue.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2df19f5f6f72da6f6ebab7cdb3a3b9f7686bb476",
"target": {
"function": "rproc_shutdown",
"file": "drivers/remoteproc/remoteproc_core.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2025-38152-1099c233",
"digest": {
"length": 678.0,
"function_hash": "252343633230900092513568056379601492685"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e66bca8cd51ebedd5d32426906a38e4a3c69c5f",
"target": {
"function": "rproc_shutdown",
"file": "drivers/remoteproc/remoteproc_core.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2025-38152-38999f56",
"digest": {
"length": 550.0,
"function_hash": "167503948211445737785366655625644614023"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e66bca8cd51ebedd5d32426906a38e4a3c69c5f",
"target": {
"file": "drivers/remoteproc/remoteproc_core.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2025-38152-5b3fdc7a",
"digest": {
"threshold": 0.9,
"line_hashes": [
"66084672946393427951251410442284533414",
"205690161949534420421534540762192201813",
"303961376236362901568314497667078483722",
"298335806381037300272187838450045223090"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e6015ca453b82ec54aec9682dcc38773948fcc48",
"target": {
"function": "rproc_shutdown",
"file": "drivers/remoteproc/remoteproc_core.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2025-38152-649faef8",
"digest": {
"length": 678.0,
"function_hash": "252343633230900092513568056379601492685"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@068f6648ff5b0c7adeb6c363fae7fb188aa178fa",
"target": {
"function": "rproc_shutdown",
"file": "drivers/remoteproc/remoteproc_core.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2025-38152-bb7a201b",
"digest": {
"length": 678.0,
"function_hash": "252343633230900092513568056379601492685"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8e0fd2a3b9852ac3cf540edb06ccc0153b38b5af",
"target": {
"function": "rproc_shutdown",
"file": "drivers/remoteproc/remoteproc_core.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2025-38152-cdfb24cb",
"digest": {
"length": 678.0,
"function_hash": "252343633230900092513568056379601492685"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@efdde3d73ab25cef4ff2d06783b0aad8b093c0e4",
"target": {
"function": "rproc_shutdown",
"file": "drivers/remoteproc/remoteproc_core.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2025-38152-e2f653c9",
"digest": {
"length": 678.0,
"function_hash": "252343633230900092513568056379601492685"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7c6bb82a6f3da6ab2d3fbea03901482231708b98",
"target": {
"function": "rproc_shutdown",
"file": "drivers/remoteproc/remoteproc_core.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2025-38152-ffcc966c",
"digest": {
"length": 678.0,
"function_hash": "252343633230900092513568056379601492685"
},
"signature_type": "Function"
}
]