CVE-2025-68202
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an unsafe locking issue in the Linux kernel's sched_ext component, specifically in the scx_dump_state() function. When the kernel is built with CONFIG_PREEMPT_RT=y, the dump_lock is converted to a sleepable spinlock that does not disable interrupts, leading to inconsistent locking states and a potential deadlock scenario. This occurs because the same lock (&rq->__lock) can be acquired twice in an interrupt context, causing a deadlock. The fix replaces the locking mechanism with irqsave/irqrestore variants to prevent this unsafe locking.
How can this vulnerability impact me? :
This vulnerability can cause a deadlock in the Linux kernel when running with real-time preemption (CONFIG_PREEMPT_RT=y). A deadlock can halt or severely disrupt system operations, potentially causing system freezes or crashes, which impacts system reliability and availability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by replacing rq_lock/unlock() with rq_lock_irqsave/irqrestore() in the scx_dump_state() function. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix, ensuring that the unsafe locking scenario is resolved.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability relates to unsafe locking in the Linux kernel's sched_ext component, specifically in scx_dump_state() when CONFIG_PREEMPT_RT=y is enabled. Detection would involve monitoring for kernel deadlocks or lock inconsistencies related to raw_spinlocks and irq_work threads. You can check kernel logs (e.g., using 'dmesg' or 'journalctl -k') for stack traces or deadlock messages similar to those described in the vulnerability. Commands to help detect issues include: 'dmesg | grep -i deadlock', 'journalctl -k | grep -i irq_work', and monitoring for kernel warnings or errors related to spinlocks or irq_work threads. Additionally, tools like 'perf' or kernel debugging tools may help trace locking issues, but no specific commands are provided in the context.