Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-68823
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-13 Jan, 2026 | 15:29
Updated At-12 Feb, 2026 | 08:19
Rejected At-
▼CVE Numbering Authority (CNA)
ublk: fix deadlock when reading partition table

In the Linux kernel, the following vulnerability has been resolved: ublk: fix deadlock when reading partition table When one process(such as udev) opens ublk block device (e.g., to read the partition table via bdev_open()), a deadlock[1] can occur: 1. bdev_open() grabs disk->open_mutex 2. The process issues read I/O to ublk backend to read partition table 3. In __ublk_complete_rq(), blk_update_request() or blk_mq_end_request() runs bio->bi_end_io() callbacks 4. If this triggers fput() on file descriptor of ublk block device, the work may be deferred to current task's task work (see fput() implementation) 5. This eventually calls blkdev_release() from the same context 6. blkdev_release() tries to grab disk->open_mutex again 7. Deadlock: same task waiting for a mutex it already holds The fix is to run blk_update_request() and blk_mq_end_request() with bottom halves disabled. This forces blkdev_release() to run in kernel work-queue context instead of current task work context, and allows ublk server to make forward progress, and avoids the deadlock. [axboe: rewrite comment in ublk]

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/block/ublk_drv.c
Default Status
unaffected
Versions
Affected
  • From 71f28f3136aff5890cd56de78abc673f8393cad9 before 64c0b7e2293757e8320f13434cd809f1c9257a62 (git)
  • From 71f28f3136aff5890cd56de78abc673f8393cad9 before 9bcc47343ee0ef346aa7b2b460c8ff56bd882fe7 (git)
  • From 71f28f3136aff5890cd56de78abc673f8393cad9 before 0460e09a614291f06c008443f47393c37b7358e7 (git)
  • From 71f28f3136aff5890cd56de78abc673f8393cad9 before c258f5c4502c9667bccf5d76fa731ab9c96687c1 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/block/ublk_drv.c
Default Status
affected
Versions
Affected
  • 6.0
Unaffected
  • From 0 before 6.0 (semver)
  • From 6.6.124 through 6.6.* (semver)
  • From 6.12.70 through 6.12.* (semver)
  • From 6.18.3 through 6.18.* (semver)
  • From 6.19 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/64c0b7e2293757e8320f13434cd809f1c9257a62
N/A
https://git.kernel.org/stable/c/9bcc47343ee0ef346aa7b2b460c8ff56bd882fe7
N/A
https://git.kernel.org/stable/c/0460e09a614291f06c008443f47393c37b7358e7
N/A
https://git.kernel.org/stable/c/c258f5c4502c9667bccf5d76fa731ab9c96687c1
N/A
Hyperlink: https://git.kernel.org/stable/c/64c0b7e2293757e8320f13434cd809f1c9257a62
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9bcc47343ee0ef346aa7b2b460c8ff56bd882fe7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0460e09a614291f06c008443f47393c37b7358e7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c258f5c4502c9667bccf5d76fa731ab9c96687c1
Resource: N/A
Details not found