{"id":"CVE-2025-38119","summary":"scsi: core: ufs: Fix a hang in the error handler","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: ufs: Fix a hang in the error handler\n\nufshcd_err_handling_prepare() calls ufshcd_rpm_get_sync(). The latter\nfunction can only succeed if UFSHCD_EH_IN_PROGRESS is not set because\nresuming involves submitting a SCSI command and ufshcd_queuecommand()\nreturns SCSI_MLQUEUE_HOST_BUSY if UFSHCD_EH_IN_PROGRESS is set. Fix this\nhang by setting UFSHCD_EH_IN_PROGRESS after ufshcd_rpm_get_sync() has\nbeen called instead of before.\n\nBacktrace:\n__switch_to+0x174/0x338\n__schedule+0x600/0x9e4\nschedule+0x7c/0xe8\nschedule_timeout+0xa4/0x1c8\nio_schedule_timeout+0x48/0x70\nwait_for_common_io+0xa8/0x160 //waiting on START_STOP\nwait_for_completion_io_timeout+0x10/0x20\nblk_execute_rq+0xe4/0x1e4\nscsi_execute_cmd+0x108/0x244\nufshcd_set_dev_pwr_mode+0xe8/0x250\n__ufshcd_wl_resume+0x94/0x354\nufshcd_wl_runtime_resume+0x3c/0x174\nscsi_runtime_resume+0x64/0xa4\nrpm_resume+0x15c/0xa1c\n__pm_runtime_resume+0x4c/0x90 // Runtime resume ongoing\nufshcd_err_handler+0x1a0/0xd08\nprocess_one_work+0x174/0x808\nworker_thread+0x15c/0x490\nkthread+0xf4/0x1ec\nret_from_fork+0x10/0x20\n\n[ bvanassche: rewrote patch description ]","modified":"2026-04-16T04:30:40.335091977Z","published":"2025-07-03T08:35:26.616Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03601-1","SUSE-SU-2025:03633-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","SUSE-SU-2025:3725-1","SUSE-SU-2025:3751-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38119.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/21f071261f946c5ca1adf378f818082a112b34d2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3464a707d137efc8aea1d4ae234d26a28d82b78c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8a3514d348de87a9d5e2ac00fbac4faae0b97996"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bb37f795d01961286b8f768a6d7152f32b589067"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ded80255c59a57cd3270d98461f6508730f9767c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f210ea4e7a790c9f5e613e5302175abd539fe9d5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f592eb12b43f21dbc972cbe583a12d256901e569"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38119.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38119"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"62694735ca95c74dac4eb9068d59801ac0ddebaf"},{"fixed":"f210ea4e7a790c9f5e613e5302175abd539fe9d5"},{"fixed":"f592eb12b43f21dbc972cbe583a12d256901e569"},{"fixed":"ded80255c59a57cd3270d98461f6508730f9767c"},{"fixed":"21f071261f946c5ca1adf378f818082a112b34d2"},{"fixed":"3464a707d137efc8aea1d4ae234d26a28d82b78c"},{"fixed":"bb37f795d01961286b8f768a6d7152f32b589067"},{"fixed":"8a3514d348de87a9d5e2ac00fbac4faae0b97996"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38119.json"}}],"schema_version":"1.7.5"}