In the Linux kernel, the following vulnerability has been resolved:
iio: light: opt3001: fix deadlock due to concurrent flag access
The threaded IRQ function in this driver is reading the flag twice: once to
lock a mutex and once to unlock it. Even though the code setting the flag
is designed to prevent it, there are subtle cases where the flag could be
true at the mutex_lock stage and false at the mutex_unlock stage. This
results in the mutex not being unlocked, resulting in a deadlock.
Fix it by making the opt3001_irq() code generally more robust, reading the
flag into a variable and using the variable value at both stages.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
16 Dec 2025, 20:30
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | CWE-667 | |
| References | () https://git.kernel.org/stable/c/1d7def97e7eb65865ccc01bbdf4eb9e6bbe8a5b5 - Patch | |
| References | () https://git.kernel.org/stable/c/2c95c8f0959d0a72575eabf2ff888f47ed6d8b77 - Patch | |
| References | () https://git.kernel.org/stable/c/748ebd8e61d0bc182c331b8df3887af7285c8a8f - Patch | |
| References | () https://git.kernel.org/stable/c/7ca84f6a22d50bf8b31efe9eb05f9859947266d7 - Patch | |
| References | () https://git.kernel.org/stable/c/957e8be112636d9bc692917286e81e54bd87decc - Patch | |
| References | () https://git.kernel.org/stable/c/a9c56ccb7cddfca754291fb24b108a5350a5fbe9 - Patch | |
| References | () https://git.kernel.org/stable/c/e791bf216c9e236b34dabf514ec0ede140cca719 - Patch | |
| References | () https://git.kernel.org/stable/c/f063a28002e3350088b4577c5640882bf4ea17ea - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* |
03 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
09 Sep 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
22 May 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
20 May 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-20 17:15
Updated : 2025-12-16 20:30
NVD link : CVE-2025-37968
Mitre link : CVE-2025-37968
CVE.ORG link : CVE-2025-37968
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-667
Improper Locking
