CVE-2025-68326
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/guc: Fix stack_depot usage
Add missing stack_depot_init() call when CONFIG_DRM_XE_DEBUG_GUC is enabled to fix the following call stack:
[] BUG: kernel NULL pointer dereference, address: 0000000000000000 [] Workqueue: drm_sched_run_job_work [gpu_sched] [] RIP: 0010:stack_depot_save_flags+0x172/0x870 [] Call Trace: [] [] fast_req_track+0x58/0xb0 [xe]
(cherry picked from commit 64fdf496a6929a0a194387d2bb5efaf5da2b542f)
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing stack_depot_init() call in drm/xe/guc when CONFIG_DRM_XE_DEBUG_GUC is enabled can cause a kernel NULL pointer dereference and system crash.
Root
Cause The vulnerability is a missing stack_depot_init() call in the Linux kernel's drm/xe/guc driver when CONFIG_DRM_XE_DEBUG_GUC is enabled. Without this initialization, subsequent calls to stack_depot_save_flags() — triggered from fast_req_track() in the GPU scheduler workqueue — attempt to access uninitialized stack depot metadata, leading to a NULL pointer dereference at address 0x0000000000000000 [1].
Exploitation
Prerequisites Exploitation requires a system running a Linux kernel built with CONFIG_DRM_XE_DEBUG_GUC=y and the xe kernel module loaded to drive Intel GPUs. The attacker would need to trigger GPU job submissions that cause the crash path to execute; this can be achieved by unprivileged users if they can access the GPU via DRM render nodes, though some configurations may require local user access to the /dev/dri/renderD* device. The crash manifests when the GPU scheduler workqueue runs fast_req_track(), which calls stack_depot_save_flags() before the stack depot subsystem has been initialized.
Impact
A successful trigger results in a kernel NULL pointer dereference, causing an immediate system crash (kernel panic or oops). This is a denial-of-service condition affecting system availability. The vulnerability does not directly allow arbitrary code execution or privilege escalation based on the available description [1].
Mitigation
The fix is included in upstream Linux kernel commits (cherry-pick from 64fdf496a6929a0a194387d2bb5efaf5da2b542f) and stable kernels that incorporate the patch. Users should apply kernel updates from their distribution. No workaround other than disabling CONFIG_DRM_XE_DEBUG_GUC (which removes debug tracing) is known. The CVE is not currently listed in CISA's Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.