CVE-2025-38356
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's drm/xe/guc driver during the driver probe process. When the driver probe is aborted early, the system might still have a pending delayed work task (CT safe mode) that tries to restart itself while the workqueue is being destroyed. This leads to a warning and potential instability because the delayed work is queued on a workqueue that no longer exists. The fix explicitly exits CT safe mode during the unwind process to prevent this warning.
How can this vulnerability impact me? :
The vulnerability can cause warnings and potential instability in the Linux kernel when the drm/xe/guc driver probe fails early. This might affect system stability or driver functionality related to the graphics component using this driver, especially during initialization failures.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel warning messages related to the drm/xe driver during device probe failures. Specifically, look for warnings such as 'workqueue: cannot queue safe_mode_worker_func [xe] on wq xe-g2h-wq' and kernel WARN messages referencing __queue_work and delayed_work_timer_fn in the system logs (e.g., dmesg). You can use the command 'dmesg | grep xe' or 'journalctl -k | grep xe' to find such warnings.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix which explicitly exits CT safe mode on unwind during driver probe. This prevents the warning and potential instability caused by destroying a workqueue with pending delayed work. Until the update is applied, monitoring for the warning messages and avoiding early aborts during VF initialization may help reduce exposure.