๐Ÿ” CVE Alert

CVE-2025-38119

UNKNOWN 0.0

scsi: core: ufs: Fix a hang in the error handler

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: core: ufs: Fix a hang in the error handler ufshcd_err_handling_prepare() calls ufshcd_rpm_get_sync(). The latter function can only succeed if UFSHCD_EH_IN_PROGRESS is not set because resuming involves submitting a SCSI command and ufshcd_queuecommand() returns SCSI_MLQUEUE_HOST_BUSY if UFSHCD_EH_IN_PROGRESS is set. Fix this hang by setting UFSHCD_EH_IN_PROGRESS after ufshcd_rpm_get_sync() has been called instead of before. Backtrace: __switch_to+0x174/0x338 __schedule+0x600/0x9e4 schedule+0x7c/0xe8 schedule_timeout+0xa4/0x1c8 io_schedule_timeout+0x48/0x70 wait_for_common_io+0xa8/0x160 //waiting on START_STOP wait_for_completion_io_timeout+0x10/0x20 blk_execute_rq+0xe4/0x1e4 scsi_execute_cmd+0x108/0x244 ufshcd_set_dev_pwr_mode+0xe8/0x250 __ufshcd_wl_resume+0x94/0x354 ufshcd_wl_runtime_resume+0x3c/0x174 scsi_runtime_resume+0x64/0xa4 rpm_resume+0x15c/0xa1c __pm_runtime_resume+0x4c/0x90 // Runtime resume ongoing ufshcd_err_handler+0x1a0/0xd08 process_one_work+0x174/0x808 worker_thread+0x15c/0x490 kthread+0xf4/0x1ec ret_from_fork+0x10/0x20 [ bvanassche: rewrote patch description ]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 3, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
62694735ca95c74dac4eb9068d59801ac0ddebaf < f210ea4e7a790c9f5e613e5302175abd539fe9d5 62694735ca95c74dac4eb9068d59801ac0ddebaf < f592eb12b43f21dbc972cbe583a12d256901e569 62694735ca95c74dac4eb9068d59801ac0ddebaf < ded80255c59a57cd3270d98461f6508730f9767c 62694735ca95c74dac4eb9068d59801ac0ddebaf < 21f071261f946c5ca1adf378f818082a112b34d2 62694735ca95c74dac4eb9068d59801ac0ddebaf < 3464a707d137efc8aea1d4ae234d26a28d82b78c 62694735ca95c74dac4eb9068d59801ac0ddebaf < bb37f795d01961286b8f768a6d7152f32b589067 62694735ca95c74dac4eb9068d59801ac0ddebaf < 8a3514d348de87a9d5e2ac00fbac4faae0b97996
Linux / Linux
3.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/f210ea4e7a790c9f5e613e5302175abd539fe9d5 git.kernel.org: https://git.kernel.org/stable/c/f592eb12b43f21dbc972cbe583a12d256901e569 git.kernel.org: https://git.kernel.org/stable/c/ded80255c59a57cd3270d98461f6508730f9767c git.kernel.org: https://git.kernel.org/stable/c/21f071261f946c5ca1adf378f818082a112b34d2 git.kernel.org: https://git.kernel.org/stable/c/3464a707d137efc8aea1d4ae234d26a28d82b78c git.kernel.org: https://git.kernel.org/stable/c/bb37f795d01961286b8f768a6d7152f32b589067 git.kernel.org: https://git.kernel.org/stable/c/8a3514d348de87a9d5e2ac00fbac4faae0b97996 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html