CVE-2025-68169
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a deadlock in the Linux kernel's netpoll subsystem caused by memory allocation while holding a spinlock. Specifically, in the refill_skbs() function, the code acquires a spinlock and then attempts to allocate memory. If the system is under severe memory pressure, the memory allocator fails and triggers an out-of-memory warning via printk(). The printk() call leads to a console output path that tries to send a UDP packet using netpoll_send_udp(), which attempts to acquire the same spinlock already held by the current CPU, causing a deadlock. The fix involves refactoring refill_skbs() to avoid allocating memory while holding the spinlock, preventing this recursive lock acquisition and deadlock.
How can this vulnerability impact me? :
This vulnerability can cause the system to deadlock under severe memory pressure conditions, specifically when the netpoll subsystem tries to allocate memory while holding a spinlock. This deadlock can halt certain kernel operations related to network packet handling and console output, potentially leading to system instability or unresponsiveness.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the netpoll deadlock issue in refill_skbs() has been fixed. The fix involves refactoring refill_skbs() to avoid memory allocation while holding the spinlock, preventing the deadlock scenario. Alternatively, applying patches that protect refill_skbs() from nested printk calls by deferring them can also mitigate the issue. Avoid running kernels with the vulnerable commit (248f6571fd4c51) and monitor for kernel updates addressing this problem.