CVE-2025-23144: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() Lockdep detects the following issue on led-backlight removal: [ 142.315935] ------------[ cut here ]------------ [ 142.315954] WARNING: CPU: 2 PID: 292 at drivers/leds/led-core.c:455 led_sysfs_enable+0x54/0x80 ... [ 142.500725] Call trace: [ 142.503176] led_sysfs_enable+0x54/0x80 (P) [ 142.507370] led_bl_remove+0x80/0xa8 [led_bl] [ 142.511742] platform_remove+0x30/0x58 [ 142.515501] device_remove+0x54/0x90 ... Indeed, led_sysfs_enable() has to be called with the led_access lock held. Hold the lock when calling led_sysfs_disable().
AI Analysis
Technical Summary
CVE-2025-23144 is a vulnerability identified in the Linux kernel, specifically within the backlight LED driver subsystem (led_bl). The issue arises from improper locking mechanisms when calling the function led_sysfs_disable(). The Linux kernel's lock dependency checker (lockdep) has detected that led_sysfs_enable() must be called while holding the led_access lock to ensure thread safety and prevent race conditions. However, the vulnerability stems from led_sysfs_disable() being called without holding this lock, which can lead to inconsistent states or race conditions during the removal of the LED backlight device. The kernel log snippet included in the description shows a warning triggered by lockdep, indicating a potential deadlock or concurrency issue during device removal. The root cause is that led_sysfs_enable() and led_sysfs_disable() must both be called with the led_access lock held to maintain synchronization, but the latter was not properly protected. This vulnerability affects multiple versions of the Linux kernel identified by the same commit hash, suggesting a systemic issue in the affected codebase. Although no known exploits are currently reported in the wild, the flaw could potentially be leveraged to cause kernel instability or denial of service by triggering race conditions or deadlocks in the LED backlight driver. The fix involves ensuring the led_access lock is held when calling led_sysfs_disable(), aligning with the locking discipline already required for led_sysfs_enable().
Potential Impact
For European organizations relying on Linux-based systems, this vulnerability could impact the stability and reliability of devices using the affected LED backlight drivers. This includes embedded systems, IoT devices, laptops, and servers running Linux kernels with the vulnerable code. Exploitation could lead to kernel warnings, deadlocks, or crashes, resulting in denial of service conditions. While this vulnerability does not directly expose confidentiality or integrity risks, the availability impact could disrupt critical services, especially in sectors like manufacturing, telecommunications, and critical infrastructure where Linux is prevalent. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any device running an affected kernel version is potentially susceptible to stability issues. European organizations with large Linux deployments, particularly those using custom or older kernels that have not been patched, are at risk of encountering system instability or service interruptions.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability has been patched, ensuring that the led_access lock is properly held during led_sysfs_disable() calls. For environments where immediate kernel upgrades are not feasible, organizations should audit their kernel versions and backlight driver usage to assess exposure. System administrators should monitor kernel logs for lockdep warnings related to led_sysfs_enable or led_sysfs_disable functions as indicators of potential exploitation or instability. Additionally, organizations should implement rigorous testing of kernel updates in staging environments to validate stability before deployment. For embedded and IoT devices, vendors should be contacted to confirm patch availability or firmware updates addressing this issue. Employing kernel lockdown features and restricting unprivileged users from triggering device removals or modifications can reduce the risk of exploitation. Finally, maintaining robust backup and recovery procedures will mitigate the impact of potential denial of service caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-23144: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() Lockdep detects the following issue on led-backlight removal: [ 142.315935] ------------[ cut here ]------------ [ 142.315954] WARNING: CPU: 2 PID: 292 at drivers/leds/led-core.c:455 led_sysfs_enable+0x54/0x80 ... [ 142.500725] Call trace: [ 142.503176] led_sysfs_enable+0x54/0x80 (P) [ 142.507370] led_bl_remove+0x80/0xa8 [led_bl] [ 142.511742] platform_remove+0x30/0x58 [ 142.515501] device_remove+0x54/0x90 ... Indeed, led_sysfs_enable() has to be called with the led_access lock held. Hold the lock when calling led_sysfs_disable().
AI-Powered Analysis
Technical Analysis
CVE-2025-23144 is a vulnerability identified in the Linux kernel, specifically within the backlight LED driver subsystem (led_bl). The issue arises from improper locking mechanisms when calling the function led_sysfs_disable(). The Linux kernel's lock dependency checker (lockdep) has detected that led_sysfs_enable() must be called while holding the led_access lock to ensure thread safety and prevent race conditions. However, the vulnerability stems from led_sysfs_disable() being called without holding this lock, which can lead to inconsistent states or race conditions during the removal of the LED backlight device. The kernel log snippet included in the description shows a warning triggered by lockdep, indicating a potential deadlock or concurrency issue during device removal. The root cause is that led_sysfs_enable() and led_sysfs_disable() must both be called with the led_access lock held to maintain synchronization, but the latter was not properly protected. This vulnerability affects multiple versions of the Linux kernel identified by the same commit hash, suggesting a systemic issue in the affected codebase. Although no known exploits are currently reported in the wild, the flaw could potentially be leveraged to cause kernel instability or denial of service by triggering race conditions or deadlocks in the LED backlight driver. The fix involves ensuring the led_access lock is held when calling led_sysfs_disable(), aligning with the locking discipline already required for led_sysfs_enable().
Potential Impact
For European organizations relying on Linux-based systems, this vulnerability could impact the stability and reliability of devices using the affected LED backlight drivers. This includes embedded systems, IoT devices, laptops, and servers running Linux kernels with the vulnerable code. Exploitation could lead to kernel warnings, deadlocks, or crashes, resulting in denial of service conditions. While this vulnerability does not directly expose confidentiality or integrity risks, the availability impact could disrupt critical services, especially in sectors like manufacturing, telecommunications, and critical infrastructure where Linux is prevalent. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any device running an affected kernel version is potentially susceptible to stability issues. European organizations with large Linux deployments, particularly those using custom or older kernels that have not been patched, are at risk of encountering system instability or service interruptions.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability has been patched, ensuring that the led_access lock is properly held during led_sysfs_disable() calls. For environments where immediate kernel upgrades are not feasible, organizations should audit their kernel versions and backlight driver usage to assess exposure. System administrators should monitor kernel logs for lockdep warnings related to led_sysfs_enable or led_sysfs_disable functions as indicators of potential exploitation or instability. Additionally, organizations should implement rigorous testing of kernel updates in staging environments to validate stability before deployment. For embedded and IoT devices, vendors should be contacted to confirm patch availability or firmware updates addressing this issue. Employing kernel lockdown features and restricting unprivileged users from triggering device removals or modifications can reduce the risk of exploitation. Finally, maintaining robust backup and recovery procedures will mitigate the impact of potential denial of service caused by this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-01-11T14:28:41.512Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe8239
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 7/3/2025, 10:10:19 PM
Last updated: 8/14/2025, 4:14:08 PM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.