CVE-2025-38114

In the Linux kernel, the following vulnerability has been resolved: e1000: Move cancel_work_sync to avoid deadlock Previously, e1000_down called cancel_work_sync for the e1000 reset task (via e1000_down_and_stop), which takes RTNL. As reported by users and syzbot, a deadlock is possible in the following scenario: CPU 0: - RTNL is held - e1000_close - e1000_down - cancel_work_sync (cancel / wait for e1000_reset_task()) CPU 1: - process_one_work - e1000_reset_task - take RTNL To remedy this, avoid calling cancel_work_sync from e1000_down (e1000_reset_task does nothing if the device is down anyway). Instead, call cancel_work_sync for e1000_reset_task when the device is being removed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*

History

20 Nov 2025, 21:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE CWE-667
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: e1000: mover cancel_work_sync para evitar el interbloqueo Anteriormente, e1000_down llamaba a cancel_work_sync para la tarea de reinicio de e1000 (a través de e1000_down_and_stop), que toma RTNL. Según lo informado por los usuarios y syzbot, es posible que se produzca un interbloqueo en el siguiente escenario: CPU 0: - Se mantiene RTNL - e1000_close - e1000_down - cancel_work_sync (cancelar/esperar a e1000_reset_task()) CPU 1: - process_one_work - e1000_reset_task - tomar RTNL Para remediar esto, evite llamar a cancel_work_sync desde e1000_down (e1000_reset_task no hace nada si el dispositivo está inactivo de todos modos). En su lugar, llame a cancel_work_sync para e1000_reset_task cuando se esté quitando el dispositivo.
References () https://git.kernel.org/stable/c/1fd4438ddcc4958ed24662d5125114299e19bae4 - () https://git.kernel.org/stable/c/1fd4438ddcc4958ed24662d5125114299e19bae4 - Patch
References () https://git.kernel.org/stable/c/b4a8085ceefb7bbb12c2b71c55e71fc946c6929f - () https://git.kernel.org/stable/c/b4a8085ceefb7bbb12c2b71c55e71fc946c6929f - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

03 Jul 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-03 09:15

Updated : 2025-11-20 21:33


NVD link : CVE-2025-38114

Mitre link : CVE-2025-38114

CVE.ORG link : CVE-2025-38114


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking