CVE-2025-68169

Source
https://cve.org/CVERecord?id=CVE-2025-68169
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68169.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68169
Downstream
Published
2025-12-16T13:42:49.270Z
Modified
2025-12-16T20:34:30.447375Z
Summary
netpoll: Fix deadlock in memory allocation under spinlock
Details

In the Linux kernel, the following vulnerability has been resolved:

netpoll: Fix deadlock in memory allocation under spinlock

Fix a AA deadlock in refillskbs() where memory allocation while holding skbpool->lock can trigger a recursive lock acquisition attempt.

The deadlock scenario occurs when the system is under severe memory pressure:

  1. refillskbs() acquires skbpool->lock (spinlock)
  2. alloc_skb() is called while holding the lock
  3. Memory allocator fails and calls slaboutof_memory()
  4. This triggers printk() for the OOM warning
  5. The console output path calls netpollsendudp()
  6. netpollsendudp() attempts to acquire the same skb_pool->lock
  7. Deadlock: the lock is already held by the same CPU

Call stack: refillskbs() spinlockirqsave(&skbpool->lock) <- lock acquired _allocskb() kmemcacheallocnodenoprof() slaboutofmemory() printk() consoleflushall() netpollsendudp() skbdequeue() spinlockirqsave(&skb_pool->lock) <- deadlock attempt

This bug was exposed by commit 248f6571fd4c51 ("netpoll: Optimize skb refilling on critical path") which removed refillskbs() from the critical path (where nested printk was being deferred), letting nested printk being called from inside refillskbs()

Refactor refill_skbs() to never allocate memory while holding the spinlock.

Another possible solution to fix this problem is protecting the refillskbs() from nested printks, basically calling printkdeferred{enter,exit}() in refillskbs(), then, any nested pr_warn() would be deferred.

I prefer this approach, given I think it might be a good idea to move the allocskb() from GFPATOMIC to GFPKERNEL in the future, so, having the allocskb() outside of the lock will be necessary step.

There is a possible TOCTOU issue when checking for the pool length, and queueing the new allocated skb, but, this is not an issue, given that an extra SKB in the pool is harmless and it will be eventually used.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68169.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
248f6571fd4c51531f7f8f07f186f7ae98a50afc
Fixed
06742a3ab884d7428c9050b205ffcf6a8a548397
Fixed
327c20c21d80e0d87834b392d83ae73c955ad8ff

Affected versions

v6.*
v6.14
v6.14-rc6
v6.14-rc7
v6.15
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.16
v6.16-rc1
v6.16-rc2
v6.16-rc3
v6.16-rc4
v6.16-rc5
v6.16-rc6
v6.16-rc7
v6.17
v6.17-rc1
v6.17-rc2
v6.17-rc3
v6.17-rc4
v6.17-rc5
v6.17-rc6
v6.17-rc7
v6.17.1
v6.17.2
v6.17.3
v6.17.4
v6.17.5
v6.17.6
v6.17.7
v6.18-rc1
v6.18-rc2
v6.18-rc3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68169.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.15.0
Fixed
6.17.8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68169.json"