{"id":"CVE-2025-40108","summary":"serial: qcom-geni: Fix blocked task","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nserial: qcom-geni: Fix blocked task\n\nRevert commit 1afa70632c39 (\"serial: qcom-geni: Enable PM runtime for\nserial driver\") and its dependent commit 86fa39dd6fb7 (\"serial:\nqcom-geni: Enable Serial on SA8255p Qualcomm platforms\") because the\nfirst one causes regression - hang task on Qualcomm RB1 board (QRB2210)\nand unable to use serial at all during normal boot:\n\n  INFO: task kworker/u16:0:12 blocked for more than 42 seconds.\n        Not tainted 6.17.0-rc1-00004-g53e760d89498 #9\n  \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n  task:kworker/u16:0   state:D stack:0     pid:12    tgid:12    ppid:2      task_flags:0x4208060 flags:0x00000010\n  Workqueue: async async_run_entry_fn\n  Call trace:\n   __switch_to+0xe8/0x1a0 (T)\n   __schedule+0x290/0x7c0\n   schedule+0x34/0x118\n   rpm_resume+0x14c/0x66c\n   rpm_resume+0x2a4/0x66c\n   rpm_resume+0x2a4/0x66c\n   rpm_resume+0x2a4/0x66c\n   __pm_runtime_resume+0x50/0x9c\n   __driver_probe_device+0x58/0x120\n   driver_probe_device+0x3c/0x154\n   __driver_attach_async_helper+0x4c/0xc0\n   async_run_entry_fn+0x34/0xe0\n   process_one_work+0x148/0x290\n   worker_thread+0x2c4/0x3e0\n   kthread+0x118/0x1c0\n   ret_from_fork+0x10/0x20\n\nThe issue was reported on 12th of August and was ignored by author of\ncommits introducing issue for two weeks.  Only after complaining author\nproduced a fix which did not work, so if original commits cannot be\nreliably fixed for 5 weeks, they obviously are buggy and need to be\ndropped.","modified":"2026-03-20T12:43:12.003244Z","published":"2025-11-09T04:35:58.587Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40108.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1e810d81769e16637bcd845ba37fbc1eba5d4bd2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a699213d4e6ef4286348c6439837990f121e0c03"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40108.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40108"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1afa70632c390488308d8e94e037df6895a3e1ac"},{"fixed":"1e810d81769e16637bcd845ba37fbc1eba5d4bd2"},{"fixed":"a699213d4e6ef4286348c6439837990f121e0c03"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40108.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"6.17.0"},{"fixed":"6.17.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40108.json"}}],"schema_version":"1.7.5"}