CVE-2025-68223

In the Linux kernel, the following vulnerability has been resolved: drm/radeon: delete radeon_fence_process in is_signaled, no deadlock Delete the attempt to progress the queue when checking if fence is signaled. This avoids deadlock. dma-fence_ops::signaled can be called with the fence lock in unknown state. For radeon, the fence lock is also the wait queue lock. This can cause a self deadlock when signaled() tries to make forward progress on the wait queue. But advancing the queue is unneeded because incorrectly returning false from signaled() is perfectly acceptable. (cherry picked from commit 527ba26e50ec2ca2be9c7c82f3ad42998a75d0db)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc6:*:*:*:*:*:*

History

26 Feb 2026, 15:53

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/73bc12d6a547f9571ce4393acfd73c004e2df9e5 - () https://git.kernel.org/stable/c/73bc12d6a547f9571ce4393acfd73c004e2df9e5 - Patch
References () https://git.kernel.org/stable/c/7e3e9b3a44c23c8eac86a41308c05077d6d30f41 - () https://git.kernel.org/stable/c/7e3e9b3a44c23c8eac86a41308c05077d6d30f41 - Patch
References () https://git.kernel.org/stable/c/9d0ed508a9e2af82951ce7d834f58c139fc2bd9b - () https://git.kernel.org/stable/c/9d0ed508a9e2af82951ce7d834f58c139fc2bd9b - Patch
References () https://git.kernel.org/stable/c/9eb00b5f5697bd56baa3222c7a1426fa15bacfb5 - () https://git.kernel.org/stable/c/9eb00b5f5697bd56baa3222c7a1426fa15bacfb5 - Patch
References () https://git.kernel.org/stable/c/d40a72d7e3bad4dfb311ef078f5a57362f088c7f - () https://git.kernel.org/stable/c/d40a72d7e3bad4dfb311ef078f5a57362f088c7f - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE CWE-667
CPE cpe:2.3:o:linux:linux_kernel:6.18:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc4:*:*:*:*:*:*

06 Feb 2026, 17:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/9d0ed508a9e2af82951ce7d834f58c139fc2bd9b -
  • () https://git.kernel.org/stable/c/d40a72d7e3bad4dfb311ef078f5a57362f088c7f -

16 Dec 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-16 14:15

Updated : 2026-02-26 15:53


NVD link : CVE-2025-68223

Mitre link : CVE-2025-68223

CVE.ORG link : CVE-2025-68223


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking