-
CVE-2025-38119
- EPSS 0.04%
- Published 03.07.2025 08:35:26
- Last modified 03.07.2025 15:13:53
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: scsi: core: ufs: Fix a hang in the error handler ufshcd_err_handling_prepare() calls ufshcd_rpm_get_sync(). The latter function can only succeed if UFSHCD_EH_IN_PROGRESS is not set because resuming involves submitting a SCSI command and ufshcd_queuecommand() returns SCSI_MLQUEUE_HOST_BUSY if UFSHCD_EH_IN_PROGRESS is set. Fix this hang by setting UFSHCD_EH_IN_PROGRESS after ufshcd_rpm_get_sync() has been called instead of before. Backtrace: __switch_to+0x174/0x338 __schedule+0x600/0x9e4 schedule+0x7c/0xe8 schedule_timeout+0xa4/0x1c8 io_schedule_timeout+0x48/0x70 wait_for_common_io+0xa8/0x160 //waiting on START_STOP wait_for_completion_io_timeout+0x10/0x20 blk_execute_rq+0xe4/0x1e4 scsi_execute_cmd+0x108/0x244 ufshcd_set_dev_pwr_mode+0xe8/0x250 __ufshcd_wl_resume+0x94/0x354 ufshcd_wl_runtime_resume+0x3c/0x174 scsi_runtime_resume+0x64/0xa4 rpm_resume+0x15c/0xa1c __pm_runtime_resume+0x4c/0x90 // Runtime resume ongoing ufshcd_err_handler+0x1a0/0xd08 process_one_work+0x174/0x808 worker_thread+0x15c/0x490 kthread+0xf4/0x1ec ret_from_fork+0x10/0x20 [ bvanassche: rewrote patch description ]
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
f592eb12b43f21dbc972cbe583a12d256901e569
Version
62694735ca95c74dac4eb9068d59801ac0ddebaf
Status
affected
Version <
ded80255c59a57cd3270d98461f6508730f9767c
Version
62694735ca95c74dac4eb9068d59801ac0ddebaf
Status
affected
Version <
21f071261f946c5ca1adf378f818082a112b34d2
Version
62694735ca95c74dac4eb9068d59801ac0ddebaf
Status
affected
Version <
3464a707d137efc8aea1d4ae234d26a28d82b78c
Version
62694735ca95c74dac4eb9068d59801ac0ddebaf
Status
affected
Version <
bb37f795d01961286b8f768a6d7152f32b589067
Version
62694735ca95c74dac4eb9068d59801ac0ddebaf
Status
affected
Version <
8a3514d348de87a9d5e2ac00fbac4faae0b97996
Version
62694735ca95c74dac4eb9068d59801ac0ddebaf
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.12
Status
affected
Version <
3.12
Version
0
Status
unaffected
Version <=
5.15.*
Version
5.15.186
Status
unaffected
Version <=
6.1.*
Version
6.1.142
Status
unaffected
Version <=
6.6.*
Version
6.6.94
Status
unaffected
Version <=
6.12.*
Version
6.12.34
Status
unaffected
Version <=
6.15.*
Version
6.15.3
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.097 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|