CVE-2025-23144: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() Lockdep detects the following issue on led-backlight removal: [ 142.315935] ------------[ cut here ]------------ [ 142.315954] WARNING: CPU: 2 PID: 292 at drivers/leds/led-core.c:455 led_sysfs_enable+0x54/0x80 ... [ 142.500725] Call trace: [ 142.503176] led_sysfs_enable+0x54/0x80 (P) [ 142.507370] led_bl_remove+0x80/0xa8 [led_bl] [ 142.511742] platform_remove+0x30/0x58 [ 142.515501] device_remove+0x54/0x90 ... Indeed, led_sysfs_enable() has to be called with the led_access lock held. Hold the lock when calling led_sysfs_disable().
AI Analysis
Technical Summary
CVE-2025-23144 is a vulnerability identified in the Linux kernel, specifically within the backlight LED driver subsystem (led_bl). The issue arises from improper locking mechanisms when calling the function led_sysfs_disable(). The Linux kernel's lock dependency checker (lockdep) has detected that led_sysfs_enable() must be called while holding the led_access lock to ensure thread safety and prevent race conditions. However, the vulnerability stems from led_sysfs_disable() being called without holding this lock, which can lead to inconsistent states or race conditions during the removal of the LED backlight device. The kernel log snippet included in the description shows a warning triggered by lockdep, indicating a potential deadlock or concurrency issue during device removal. The root cause is that led_sysfs_enable() and led_sysfs_disable() must both be called with the led_access lock held to maintain synchronization, but the latter was not properly protected. This vulnerability affects multiple versions of the Linux kernel identified by the same commit hash, suggesting a systemic issue in the affected codebase. Although no known exploits are currently reported in the wild, the flaw could potentially be leveraged to cause kernel instability or denial of service by triggering race conditions or deadlocks in the LED backlight driver. The fix involves ensuring the led_access lock is held when calling led_sysfs_disable(), aligning with the locking discipline already required for led_sysfs_enable().
Potential Impact
For European organizations relying on Linux-based systems, this vulnerability could impact the stability and reliability of devices using the affected LED backlight drivers. This includes embedded systems, IoT devices, laptops, and servers running Linux kernels with the vulnerable code. Exploitation could lead to kernel warnings, deadlocks, or crashes, resulting in denial of service conditions. While this vulnerability does not directly expose confidentiality or integrity risks, the availability impact could disrupt critical services, especially in sectors like manufacturing, telecommunications, and critical infrastructure where Linux is prevalent. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any device running an affected kernel version is potentially susceptible to stability issues. European organizations with large Linux deployments, particularly those using custom or older kernels that have not been patched, are at risk of encountering system instability or service interruptions.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability has been patched, ensuring that the led_access lock is properly held during led_sysfs_disable() calls. For environments where immediate kernel upgrades are not feasible, organizations should audit their kernel versions and backlight driver usage to assess exposure. System administrators should monitor kernel logs for lockdep warnings related to led_sysfs_enable or led_sysfs_disable functions as indicators of potential exploitation or instability. Additionally, organizations should implement rigorous testing of kernel updates in staging environments to validate stability before deployment. For embedded and IoT devices, vendors should be contacted to confirm patch availability or firmware updates addressing this issue. Employing kernel lockdown features and restricting unprivileged users from triggering device removals or modifications can reduce the risk of exploitation. Finally, maintaining robust backup and recovery procedures will mitigate the impact of potential denial of service caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-23144: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() Lockdep detects the following issue on led-backlight removal: [ 142.315935] ------------[ cut here ]------------ [ 142.315954] WARNING: CPU: 2 PID: 292 at drivers/leds/led-core.c:455 led_sysfs_enable+0x54/0x80 ... [ 142.500725] Call trace: [ 142.503176] led_sysfs_enable+0x54/0x80 (P) [ 142.507370] led_bl_remove+0x80/0xa8 [led_bl] [ 142.511742] platform_remove+0x30/0x58 [ 142.515501] device_remove+0x54/0x90 ... Indeed, led_sysfs_enable() has to be called with the led_access lock held. Hold the lock when calling led_sysfs_disable().
AI-Powered Analysis
Technical Analysis
CVE-2025-23144 is a vulnerability identified in the Linux kernel, specifically within the backlight LED driver subsystem (led_bl). The issue arises from improper locking mechanisms when calling the function led_sysfs_disable(). The Linux kernel's lock dependency checker (lockdep) has detected that led_sysfs_enable() must be called while holding the led_access lock to ensure thread safety and prevent race conditions. However, the vulnerability stems from led_sysfs_disable() being called without holding this lock, which can lead to inconsistent states or race conditions during the removal of the LED backlight device. The kernel log snippet included in the description shows a warning triggered by lockdep, indicating a potential deadlock or concurrency issue during device removal. The root cause is that led_sysfs_enable() and led_sysfs_disable() must both be called with the led_access lock held to maintain synchronization, but the latter was not properly protected. This vulnerability affects multiple versions of the Linux kernel identified by the same commit hash, suggesting a systemic issue in the affected codebase. Although no known exploits are currently reported in the wild, the flaw could potentially be leveraged to cause kernel instability or denial of service by triggering race conditions or deadlocks in the LED backlight driver. The fix involves ensuring the led_access lock is held when calling led_sysfs_disable(), aligning with the locking discipline already required for led_sysfs_enable().
Potential Impact
For European organizations relying on Linux-based systems, this vulnerability could impact the stability and reliability of devices using the affected LED backlight drivers. This includes embedded systems, IoT devices, laptops, and servers running Linux kernels with the vulnerable code. Exploitation could lead to kernel warnings, deadlocks, or crashes, resulting in denial of service conditions. While this vulnerability does not directly expose confidentiality or integrity risks, the availability impact could disrupt critical services, especially in sectors like manufacturing, telecommunications, and critical infrastructure where Linux is prevalent. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any device running an affected kernel version is potentially susceptible to stability issues. European organizations with large Linux deployments, particularly those using custom or older kernels that have not been patched, are at risk of encountering system instability or service interruptions.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability has been patched, ensuring that the led_access lock is properly held during led_sysfs_disable() calls. For environments where immediate kernel upgrades are not feasible, organizations should audit their kernel versions and backlight driver usage to assess exposure. System administrators should monitor kernel logs for lockdep warnings related to led_sysfs_enable or led_sysfs_disable functions as indicators of potential exploitation or instability. Additionally, organizations should implement rigorous testing of kernel updates in staging environments to validate stability before deployment. For embedded and IoT devices, vendors should be contacted to confirm patch availability or firmware updates addressing this issue. Employing kernel lockdown features and restricting unprivileged users from triggering device removals or modifications can reduce the risk of exploitation. Finally, maintaining robust backup and recovery procedures will mitigate the impact of potential denial of service caused by this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-01-11T14:28:41.512Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe8239
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 7/3/2025, 10:10:19 PM
Last updated: 10/16/2025, 6:05:49 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-0275: CWE-306 Missing Authentication for Critical Function in HCL Software BigFix Mobile
MediumCVE-2025-0274: CWE-306 Missing Authentication for Critical Function in HCL Software BigFix Modern Client Management
MediumCVE-2025-11814: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Brainstorm Force Ultimate Addons for WPBakery
MediumCVE-2025-62580: CWE-121 Stack-based Buffer Overflow in Delta Electronics ASDA-Soft
HighCVE-2025-62579: CWE-121 Stack-based Buffer Overflow in Delta Electronics ASDA-Soft
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.