VYPR
Unrated severityNVD Advisory· Published Dec 22, 2025· Updated Apr 15, 2026

CVE-2025-68326

CVE-2025-68326

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/xe/guc: Fix stack_depot usage

Add missing stack_depot_init() call when CONFIG_DRM_XE_DEBUG_GUC is enabled to fix the following call stack:

[] BUG: kernel NULL pointer dereference, address: 0000000000000000 [] Workqueue: drm_sched_run_job_work [gpu_sched] [] RIP: 0010:stack_depot_save_flags+0x172/0x870 [] Call Trace: [] [] fast_req_track+0x58/0xb0 [xe]

(cherry picked from commit 64fdf496a6929a0a194387d2bb5efaf5da2b542f)

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing stack_depot_init() call in drm/xe/guc when CONFIG_DRM_XE_DEBUG_GUC is enabled can cause a kernel NULL pointer dereference and system crash.

Root

Cause The vulnerability is a missing stack_depot_init() call in the Linux kernel's drm/xe/guc driver when CONFIG_DRM_XE_DEBUG_GUC is enabled. Without this initialization, subsequent calls to stack_depot_save_flags() — triggered from fast_req_track() in the GPU scheduler workqueue — attempt to access uninitialized stack depot metadata, leading to a NULL pointer dereference at address 0x0000000000000000 [1].

Exploitation

Prerequisites Exploitation requires a system running a Linux kernel built with CONFIG_DRM_XE_DEBUG_GUC=y and the xe kernel module loaded to drive Intel GPUs. The attacker would need to trigger GPU job submissions that cause the crash path to execute; this can be achieved by unprivileged users if they can access the GPU via DRM render nodes, though some configurations may require local user access to the /dev/dri/renderD* device. The crash manifests when the GPU scheduler workqueue runs fast_req_track(), which calls stack_depot_save_flags() before the stack depot subsystem has been initialized.

Impact

A successful trigger results in a kernel NULL pointer dereference, causing an immediate system crash (kernel panic or oops). This is a denial-of-service condition affecting system availability. The vulnerability does not directly allow arbitrary code execution or privilege escalation based on the available description [1].

Mitigation

The fix is included in upstream Linux kernel commits (cherry-pick from 64fdf496a6929a0a194387d2bb5efaf5da2b542f) and stable kernels that incorporate the patch. Users should apply kernel updates from their distribution. No workaround other than disabling CONFIG_DRM_XE_DEBUG_GUC (which removes debug tracing) is known. The CVE is not currently listed in CISA's Known Exploited Vulnerabilities (KEV) catalog.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.