CVE-2025-38356

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38356
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38356.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-38356
Downstream
Related
Published
2025-07-25T13:15:24Z
Modified
2025-07-25T16:00:23Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/xe/guc: Explicitly exit CT safe mode on unwind

During driver probe we might be briefly using CT safe mode, which is based on a delayed work, but usually we are able to stop this once we have IRQ fully operational. However, if we abort the probe quite early then during unwind we might try to destroy the workqueue while there is still a pending delayed work that attempts to restart itself which triggers a WARN.

This was recently observed during unsuccessful VF initialization:

[ ] xe 0000:00:02.1: probe with driver xe failed with error -62 [ ] ------------[ cut here ]------------ [ ] workqueue: cannot queue safemodeworkerfunc [xe] on wq xe-g2h-wq [ ] WARNING: CPU: 9 PID: 0 at kernel/workqueue.c:2257 queuework+0x287/0x710 [ ] RIP: 0010:queuework+0x287/0x710 [ ] Call Trace: [ ] delayedworktimerfn+0x19/0x30 [ ] calltimerfn+0xa1/0x2a0

Exit the CT safe mode on unwind to avoid that warning.

(cherry picked from commit 2ddbb73ec20b98e70a5200cb85deade22ccea2ec)

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.37-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}