๐Ÿ” CVE Alert

CVE-2025-68823

UNKNOWN 0.0

ublk: fix deadlock when reading partition table

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ublk: fix deadlock when reading partition table When one process(such as udev) opens ublk block device (e.g., to read the partition table via bdev_open()), a deadlock[1] can occur: 1. bdev_open() grabs disk->open_mutex 2. The process issues read I/O to ublk backend to read partition table 3. In __ublk_complete_rq(), blk_update_request() or blk_mq_end_request() runs bio->bi_end_io() callbacks 4. If this triggers fput() on file descriptor of ublk block device, the work may be deferred to current task's task work (see fput() implementation) 5. This eventually calls blkdev_release() from the same context 6. blkdev_release() tries to grab disk->open_mutex again 7. Deadlock: same task waiting for a mutex it already holds The fix is to run blk_update_request() and blk_mq_end_request() with bottom halves disabled. This forces blkdev_release() to run in kernel work-queue context instead of current task work context, and allows ublk server to make forward progress, and avoids the deadlock. [axboe: rewrite comment in ublk]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 13, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
71f28f3136aff5890cd56de78abc673f8393cad9 < 64c0b7e2293757e8320f13434cd809f1c9257a62 71f28f3136aff5890cd56de78abc673f8393cad9 < 9bcc47343ee0ef346aa7b2b460c8ff56bd882fe7 71f28f3136aff5890cd56de78abc673f8393cad9 < 0460e09a614291f06c008443f47393c37b7358e7 71f28f3136aff5890cd56de78abc673f8393cad9 < c258f5c4502c9667bccf5d76fa731ab9c96687c1
Linux / Linux
6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/64c0b7e2293757e8320f13434cd809f1c9257a62 git.kernel.org: https://git.kernel.org/stable/c/9bcc47343ee0ef346aa7b2b460c8ff56bd882fe7 git.kernel.org: https://git.kernel.org/stable/c/0460e09a614291f06c008443f47393c37b7358e7 git.kernel.org: https://git.kernel.org/stable/c/c258f5c4502c9667bccf5d76fa731ab9c96687c1