Skip to main content

CVE-2025-23144: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-23144cvecve-2025-23144
Published: Thu May 01 2025 (05/01/2025, 12:55:33 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() Lockdep detects the following issue on led-backlight removal: [ 142.315935] ------------[ cut here ]------------ [ 142.315954] WARNING: CPU: 2 PID: 292 at drivers/leds/led-core.c:455 led_sysfs_enable+0x54/0x80 ... [ 142.500725] Call trace: [ 142.503176] led_sysfs_enable+0x54/0x80 (P) [ 142.507370] led_bl_remove+0x80/0xa8 [led_bl] [ 142.511742] platform_remove+0x30/0x58 [ 142.515501] device_remove+0x54/0x90 ... Indeed, led_sysfs_enable() has to be called with the led_access lock held. Hold the lock when calling led_sysfs_disable().

AI-Powered Analysis

AILast updated: 07/03/2025, 22:10:19 UTC

Technical Analysis

CVE-2025-23144 is a vulnerability identified in the Linux kernel, specifically within the backlight LED driver subsystem (led_bl). The issue arises from improper locking mechanisms when calling the function led_sysfs_disable(). The Linux kernel's lock dependency checker (lockdep) has detected that led_sysfs_enable() must be called while holding the led_access lock to ensure thread safety and prevent race conditions. However, the vulnerability stems from led_sysfs_disable() being called without holding this lock, which can lead to inconsistent states or race conditions during the removal of the LED backlight device. The kernel log snippet included in the description shows a warning triggered by lockdep, indicating a potential deadlock or concurrency issue during device removal. The root cause is that led_sysfs_enable() and led_sysfs_disable() must both be called with the led_access lock held to maintain synchronization, but the latter was not properly protected. This vulnerability affects multiple versions of the Linux kernel identified by the same commit hash, suggesting a systemic issue in the affected codebase. Although no known exploits are currently reported in the wild, the flaw could potentially be leveraged to cause kernel instability or denial of service by triggering race conditions or deadlocks in the LED backlight driver. The fix involves ensuring the led_access lock is held when calling led_sysfs_disable(), aligning with the locking discipline already required for led_sysfs_enable().

Potential Impact

For European organizations relying on Linux-based systems, this vulnerability could impact the stability and reliability of devices using the affected LED backlight drivers. This includes embedded systems, IoT devices, laptops, and servers running Linux kernels with the vulnerable code. Exploitation could lead to kernel warnings, deadlocks, or crashes, resulting in denial of service conditions. While this vulnerability does not directly expose confidentiality or integrity risks, the availability impact could disrupt critical services, especially in sectors like manufacturing, telecommunications, and critical infrastructure where Linux is prevalent. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any device running an affected kernel version is potentially susceptible to stability issues. European organizations with large Linux deployments, particularly those using custom or older kernels that have not been patched, are at risk of encountering system instability or service interruptions.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability has been patched, ensuring that the led_access lock is properly held during led_sysfs_disable() calls. For environments where immediate kernel upgrades are not feasible, organizations should audit their kernel versions and backlight driver usage to assess exposure. System administrators should monitor kernel logs for lockdep warnings related to led_sysfs_enable or led_sysfs_disable functions as indicators of potential exploitation or instability. Additionally, organizations should implement rigorous testing of kernel updates in staging environments to validate stability before deployment. For embedded and IoT devices, vendors should be contacted to confirm patch availability or firmware updates addressing this issue. Employing kernel lockdown features and restricting unprivileged users from triggering device removals or modifications can reduce the risk of exploitation. Finally, maintaining robust backup and recovery procedures will mitigate the impact of potential denial of service caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-01-11T14:28:41.512Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9832c4522896dcbe8239

Added to database: 5/21/2025, 9:09:06 AM

Last enriched: 7/3/2025, 10:10:19 PM

Last updated: 8/14/2025, 4:14:08 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats