CVE-2025-68320
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
16/12/2025
Última modificación:
18/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
lan966x: Fix sleeping in atomic context<br />
<br />
The following warning was seen when we try to connect using ssh to the device.<br />
<br />
BUG: sleeping function called from invalid context at kernel/locking/mutex.c:575<br />
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 104, name: dropbear<br />
preempt_count: 1, expected: 0<br />
INFO: lockdep is turned off.<br />
CPU: 0 UID: 0 PID: 104 Comm: dropbear Tainted: G W 6.18.0-rc2-00399-g6f1ab1b109b9-dirty #530 NONE<br />
Tainted: [W]=WARN<br />
Hardware name: Generic DT based system<br />
Call trace:<br />
unwind_backtrace from show_stack+0x10/0x14<br />
show_stack from dump_stack_lvl+0x7c/0xac<br />
dump_stack_lvl from __might_resched+0x16c/0x2b0<br />
__might_resched from __mutex_lock+0x64/0xd34<br />
__mutex_lock from mutex_lock_nested+0x1c/0x24<br />
mutex_lock_nested from lan966x_stats_get+0x5c/0x558<br />
lan966x_stats_get from dev_get_stats+0x40/0x43c<br />
dev_get_stats from dev_seq_printf_stats+0x3c/0x184<br />
dev_seq_printf_stats from dev_seq_show+0x10/0x30<br />
dev_seq_show from seq_read_iter+0x350/0x4ec<br />
seq_read_iter from seq_read+0xfc/0x194<br />
seq_read from proc_reg_read+0xac/0x100<br />
proc_reg_read from vfs_read+0xb0/0x2b0<br />
vfs_read from ksys_read+0x6c/0xec<br />
ksys_read from ret_fast_syscall+0x0/0x1c<br />
Exception stack(0xf0b11fa8 to 0xf0b11ff0)<br />
1fa0: 00000001 00001000 00000008 be9048d8 00001000 00000001<br />
1fc0: 00000001 00001000 00000008 00000003 be905920 0000001e 00000000 00000001<br />
1fe0: 0005404c be9048c0 00018684 b6ec2cd8<br />
<br />
It seems that we are using a mutex in a atomic context which is wrong.<br />
Change the mutex with a spinlock.



