๐Ÿ” CVE Alert

CVE-2025-37968

UNKNOWN 0.0

iio: light: opt3001: fix deadlock due to concurrent flag access

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: iio: light: opt3001: fix deadlock due to concurrent flag access The threaded IRQ function in this driver is reading the flag twice: once to lock a mutex and once to unlock it. Even though the code setting the flag is designed to prevent it, there are subtle cases where the flag could be true at the mutex_lock stage and false at the mutex_unlock stage. This results in the mutex not being unlocked, resulting in a deadlock. Fix it by making the opt3001_irq() code generally more robust, reading the flag into a variable and using the variable value at both stages.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 20, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
94a9b7b1809f56cfaa080e70ec49b6979563a237 < a9c56ccb7cddfca754291fb24b108a5350a5fbe9 94a9b7b1809f56cfaa080e70ec49b6979563a237 < 957e8be112636d9bc692917286e81e54bd87decc 94a9b7b1809f56cfaa080e70ec49b6979563a237 < 1d7def97e7eb65865ccc01bbdf4eb9e6bbe8a5b5 94a9b7b1809f56cfaa080e70ec49b6979563a237 < 748ebd8e61d0bc182c331b8df3887af7285c8a8f 94a9b7b1809f56cfaa080e70ec49b6979563a237 < e791bf216c9e236b34dabf514ec0ede140cca719 94a9b7b1809f56cfaa080e70ec49b6979563a237 < 7ca84f6a22d50bf8b31efe9eb05f9859947266d7 94a9b7b1809f56cfaa080e70ec49b6979563a237 < 2c95c8f0959d0a72575eabf2ff888f47ed6d8b77 94a9b7b1809f56cfaa080e70ec49b6979563a237 < f063a28002e3350088b4577c5640882bf4ea17ea
Linux / Linux
4.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a9c56ccb7cddfca754291fb24b108a5350a5fbe9 git.kernel.org: https://git.kernel.org/stable/c/957e8be112636d9bc692917286e81e54bd87decc git.kernel.org: https://git.kernel.org/stable/c/1d7def97e7eb65865ccc01bbdf4eb9e6bbe8a5b5 git.kernel.org: https://git.kernel.org/stable/c/748ebd8e61d0bc182c331b8df3887af7285c8a8f git.kernel.org: https://git.kernel.org/stable/c/e791bf216c9e236b34dabf514ec0ede140cca719 git.kernel.org: https://git.kernel.org/stable/c/7ca84f6a22d50bf8b31efe9eb05f9859947266d7 git.kernel.org: https://git.kernel.org/stable/c/2c95c8f0959d0a72575eabf2ff888f47ed6d8b77 git.kernel.org: https://git.kernel.org/stable/c/f063a28002e3350088b4577c5640882bf4ea17ea lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html