CVE-2025-68756
BaseFortify
Publication date: 2026-01-05
Last updated on: 2026-01-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a deadlock in the Linux kernel's block multi-queue (blk-mq) subsystem. Specifically, the functions blk_mq_add_queue_tag_set() and blk_mq_del_queue_tag_set() manage queues in a tagset and use a mutex (set->tag_list_lock) to prevent concurrent modifications. However, after a change in the NVMe driver to quiesce the entire tagset instead of individual queues, a deadlock can occur between two threads: one waiting to acquire the tag_list_lock while quiescing the tagset, and another holding the lock but waiting for queues to be frozen. This deadlock causes the system to hang. The fix involves replacing the mutex locking with Read-Copy-Update (RCU) mechanisms in blk_mq_[un]quiesce_tagset() and related functions to avoid the deadlock.
How can this vulnerability impact me? :
This vulnerability can cause a deadlock in the Linux kernel's block multi-queue subsystem, leading to system hangs or freezes when NVMe devices experience command timeouts. This can result in degraded system performance, unresponsiveness, or potential data access issues until the system is rebooted or the deadlock is resolved.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where blk_mq_[un]quiesce_tagset() uses RCU instead of set->tag_list_lock, as this resolves the deadlock issue. Applying the patch or kernel update that includes this fix will prevent the deadlock caused by the nvme driver and blk-mq interaction.