CVE-2025-38353

5.5 MEDIUM

📋 TL;DR

This CVE describes a race condition vulnerability in the Linux kernel's Xe graphics driver where the system attempts to acquire an invalid mutex lock during device wedge recovery. This can cause kernel warnings, system instability, or potential denial of service. It affects systems using Intel Xe graphics drivers in the Linux kernel.

💻 Affected Systems

Products:
  • Linux kernel with Intel Xe graphics driver (drm/xe)
Versions: Linux kernel versions containing the vulnerable Xe driver code prior to fixes in commits 1e1981b16bb1bbe2fafa57ed439b45cb5b34e32d, 20eec7018e132a023f84ccbdf56b6c5b73d3094f, a6d81b2d7037ef36163ad16459ed3fd17cb1b596
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel Xe graphics hardware and the Xe driver to be loaded and active.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic or system crash leading to denial of service, potentially requiring physical reboot.

🟠

Likely Case

Kernel warning messages in logs and temporary system instability during graphics driver recovery events.

🟢

If Mitigated

Minor performance impact during graphics operations with proper driver state management.

🌐 Internet-Facing: LOW - This is a local kernel driver issue not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local users or processes could potentially trigger the condition through graphics operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH - Requires specific timing and graphics driver state manipulation.

This appears to be a race condition bug rather than a security vulnerability with direct exploitation paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions containing the fix commits

Vendor Advisory: https://git.kernel.org/stable/c/1e1981b16bb1bbe2fafa57ed439b45cb5b34e32d

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify Xe driver is functioning correctly.

🔧 Temporary Workarounds

Disable Xe graphics driver

linux

Prevent loading of the vulnerable Xe graphics driver module

echo 'blacklist xe' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Monitor system logs for kernel warnings related to Xe driver or mutex lock issues
  • Consider using alternative graphics drivers if available for your hardware

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if Xe driver is loaded: 'uname -r' and 'lsmod | grep xe'

Check Version:

uname -r

Verify Fix Applied:

Check if kernel version includes the fix commits and monitor logs for absence of mutex warnings

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs containing 'DEBUG_LOCKS_WARN_ON', 'device wedged', or mutex-related warnings from Xe driver

Network Indicators:

  • None - this is a local kernel issue

SIEM Query:

source="kernel" AND ("DEBUG_LOCKS_WARN_ON" OR "device wedged" OR "xe_guc_submit_wedge")

🔗 References

📤 Share & Export