CVE-2025-68178
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17.0-rc3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a possible deadlock in the Linux kernel's blk-cgroup subsystem while configuring policy. It occurs due to a circular locking dependency involving multiple locks (sysfs_lock, rq_qos_mutex, and q_usage_counter). The deadlock can be triggered when one task tries to acquire a lock that is already held in a conflicting order by another task, causing a circular wait. The root cause is that queue_usage_counter is grabbed with rq_qos_mutex held, while the queue should be frozen before rq_qos_mutex from another context. The fix involves converting blk_queue_enter() to use blkcg_mutex instead of rq_qos_mutex to avoid this unsafe locking scenario.
How can this vulnerability impact me? :
This vulnerability can cause a deadlock in the Linux kernel, which means that certain operations related to block device control groups (blk-cgroup) may hang indefinitely. This can lead to system instability, degraded performance, or unresponsiveness in affected systems, especially those relying on block device cgroup policies.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel warnings related to possible circular locking dependencies. Specifically, the kernel log may show messages like 'WARNING: possible circular locking dependency detected' involving blk-cgroup locks such as sysfs_lock, rq_qos_mutex, and q_usage_counter. Monitoring kernel logs (e.g., using 'dmesg' or 'journalctl -k') for such warnings can help detect this issue. There are no specific commands provided to detect this vulnerability beyond checking for these kernel warnings.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this deadlock issue in blk-cgroup has been fixed. The fix involves converting blk_queue_enter() to use blkcg_mutex instead of rq_qos_mutex and changing blkg_alloc() to use GFP_NOIO to avoid the deadlock scenario. Until the kernel is updated, monitoring for deadlock warnings and avoiding operations that trigger blk_unregister_queue and del_gendisk concurrently may reduce the risk. However, the primary recommended step is to apply the kernel patch that addresses this locking order problem.