CVE-2025-23144
Linux Kernel vulnerability analysis and mitigation

Overview

A vulnerability in the Linux kernel's LED backlight subsystem was identified and tracked as CVE-2025-23144. The issue was discovered on May 1, 2025, involving the ledbl driver where the ledaccess lock was not properly held when calling ledsysfsdisable() (NVD, Wiz).

Technical details

The vulnerability manifests as a locking issue in the LED backlight driver of the Linux kernel. Specifically, the ledsysfsenable() function was being called without holding the required led_access lock during LED backlight removal operations. This issue was detected by the kernel's Lockdep system, which reported warnings during the led-backlight removal process at drivers/leds/led-core.c:455. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 with the vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (Red Hat).

Impact

The vulnerability affects various Linux kernel versions, including Debian distributions: bullseye (5.10.223-1 and 5.10.234-1), bookworm (6.1.129-1 and 6.1.135-1), and trixie (6.12.22-1). The issue could potentially lead to system instability or crashes during LED backlight removal operations (Wiz).

Mitigation and workarounds

The vulnerability has been fixed in Linux kernel version 6.12.25-1. The fix involves properly holding the ledaccess lock when calling ledsysfs_disable(). Users are advised to upgrade to the fixed version to mitigate this issue (Wiz).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management