CVE-2025-68319
Linux Kernel vulnerability analysis and mitigation

In the Linux kernel, the following vulnerability has been resolved:

netconsole: Acquire su_mutex before navigating configs hierarchy

There is a race between operations that iterate over the userdata cgchildren list and concurrent add/remove of userdata items through configfs. The updateuserdata() function iterates over the nt->userdatagroup.cgchildren list, and countextradataentries() also iterates over this same list to count nodes.

Quoting from Documentation/filesystems/configfs.rst:

A subsystem can navigate the cgchildren list and the ciparent pointer to see the tree created by the subsystem. This can race with configfs' management of the hierarchy, so configfs uses the subsystem mutex to protect modifications. Whenever a subsystem wants to navigate the hierarchy, it must do so under the protection of the subsystem mutex.

Without proper locking, if a userdata item is added or removed concurrently while these functions are iterating, the list can be accessed in an inconsistent state. For example, the listforeach() loop can reach a node that is being removed from the list by listdelinit() which sets the nodes' .next pointer to point to itself, so the loop will never end (or reach the WARNONONCE in update_userdata() ).

Fix this by holding the configfs subsystem mutex (sumutex) during all operations that iterate over cgchildren. This includes:

  • userdatumvaluestore() which calls updateuserdata() to iterate over cgchildren
  • All sysdata*enabledstore() functions which call countextradataentries() to iterate over cgchildren

The sumutex must be acquired before dynamicnetconsolemutex to avoid potential lock ordering issues, as configfs operations may already hold sumutex when calling into our code.


SourceNVD

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68321N/AN/A
  • Linux KernelLinux Kernel
  • kernel-core
NoYesDec 16, 2025
CVE-2025-68319N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-core
NoYesDec 16, 2025
CVE-2025-68317N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-modules-extra
NoYesDec 16, 2025
CVE-2025-68313N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-modules
NoYesDec 16, 2025
CVE-2025-68312N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-modules-extra
NoYesDec 16, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management