๐Ÿ” CVE Alert

CVE-2025-23144

UNKNOWN 0.0

backlight: led_bl: Hold led_access lock when calling led_sysfs_disable()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() Lockdep detects the following issue on led-backlight removal: [ 142.315935] ------------[ cut here ]------------ [ 142.315954] WARNING: CPU: 2 PID: 292 at drivers/leds/led-core.c:455 led_sysfs_enable+0x54/0x80 ... [ 142.500725] Call trace: [ 142.503176] led_sysfs_enable+0x54/0x80 (P) [ 142.507370] led_bl_remove+0x80/0xa8 [led_bl] [ 142.511742] platform_remove+0x30/0x58 [ 142.515501] device_remove+0x54/0x90 ... Indeed, led_sysfs_enable() has to be called with the led_access lock held. Hold the lock when calling led_sysfs_disable().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ae232e45acf9621f2c96b41ca3af006ac7552c33 < 87d947a0607be384bfe7bb0935884a711e35ca07 ae232e45acf9621f2c96b41ca3af006ac7552c33 < 74c7d67a3c305fc1fa03c32a838e8446fb7aee14 ae232e45acf9621f2c96b41ca3af006ac7552c33 < b447885ec9130cf86f355e011dc6b94d6ccfb5b7 ae232e45acf9621f2c96b41ca3af006ac7552c33 < 1c82f5a393d8b9a5c1ea032413719862098afd4b ae232e45acf9621f2c96b41ca3af006ac7552c33 < 61a5c565fd2442d3128f3bab5f022658adc3a4e6 ae232e45acf9621f2c96b41ca3af006ac7552c33 < 11d128f7eacec276c75cf4712880a6307ca9c885 ae232e45acf9621f2c96b41ca3af006ac7552c33 < b8ddf5107f53789448900f04fa220f34cd2f777e ae232e45acf9621f2c96b41ca3af006ac7552c33 < 276822a00db3c1061382b41e72cafc09d6a0ec30
Linux / Linux
5.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/87d947a0607be384bfe7bb0935884a711e35ca07 git.kernel.org: https://git.kernel.org/stable/c/74c7d67a3c305fc1fa03c32a838e8446fb7aee14 git.kernel.org: https://git.kernel.org/stable/c/b447885ec9130cf86f355e011dc6b94d6ccfb5b7 git.kernel.org: https://git.kernel.org/stable/c/1c82f5a393d8b9a5c1ea032413719862098afd4b git.kernel.org: https://git.kernel.org/stable/c/61a5c565fd2442d3128f3bab5f022658adc3a4e6 git.kernel.org: https://git.kernel.org/stable/c/11d128f7eacec276c75cf4712880a6307ca9c885 git.kernel.org: https://git.kernel.org/stable/c/b8ddf5107f53789448900f04fa220f34cd2f777e git.kernel.org: https://git.kernel.org/stable/c/276822a00db3c1061382b41e72cafc09d6a0ec30 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html