CVE-2025-38119
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/07/2025
Last modified:
19/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: core: ufs: Fix a hang in the error handler<br />
<br />
ufshcd_err_handling_prepare() calls ufshcd_rpm_get_sync(). The latter<br />
function can only succeed if UFSHCD_EH_IN_PROGRESS is not set because<br />
resuming involves submitting a SCSI command and ufshcd_queuecommand()<br />
returns SCSI_MLQUEUE_HOST_BUSY if UFSHCD_EH_IN_PROGRESS is set. Fix this<br />
hang by setting UFSHCD_EH_IN_PROGRESS after ufshcd_rpm_get_sync() has<br />
been called instead of before.<br />
<br />
Backtrace:<br />
__switch_to+0x174/0x338<br />
__schedule+0x600/0x9e4<br />
schedule+0x7c/0xe8<br />
schedule_timeout+0xa4/0x1c8<br />
io_schedule_timeout+0x48/0x70<br />
wait_for_common_io+0xa8/0x160 //waiting on START_STOP<br />
wait_for_completion_io_timeout+0x10/0x20<br />
blk_execute_rq+0xe4/0x1e4<br />
scsi_execute_cmd+0x108/0x244<br />
ufshcd_set_dev_pwr_mode+0xe8/0x250<br />
__ufshcd_wl_resume+0x94/0x354<br />
ufshcd_wl_runtime_resume+0x3c/0x174<br />
scsi_runtime_resume+0x64/0xa4<br />
rpm_resume+0x15c/0xa1c<br />
__pm_runtime_resume+0x4c/0x90 // Runtime resume ongoing<br />
ufshcd_err_handler+0x1a0/0xd08<br />
process_one_work+0x174/0x808<br />
worker_thread+0x15c/0x490<br />
kthread+0xf4/0x1ec<br />
ret_from_fork+0x10/0x20<br />
<br />
[ bvanassche: rewrote patch description ]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.12 (including) | 5.15.186 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.94 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.34 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/21f071261f946c5ca1adf378f818082a112b34d2
- https://git.kernel.org/stable/c/3464a707d137efc8aea1d4ae234d26a28d82b78c
- https://git.kernel.org/stable/c/8a3514d348de87a9d5e2ac00fbac4faae0b97996
- https://git.kernel.org/stable/c/bb37f795d01961286b8f768a6d7152f32b589067
- https://git.kernel.org/stable/c/ded80255c59a57cd3270d98461f6508730f9767c
- https://git.kernel.org/stable/c/f210ea4e7a790c9f5e613e5302175abd539fe9d5
- https://git.kernel.org/stable/c/f592eb12b43f21dbc972cbe583a12d256901e569
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



