CVE-2025-39731
BaseFortify
Publication date: 2025-09-07
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed. The patch modifies the in_task() check inside f2fs_read_end_io() to ensure vm_unmap_ram() is called only in valid contexts, preventing the issue. Until the update is applied, monitoring logs for the described warnings can help detect occurrences, but no other specific mitigation steps are provided.
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's F2FS filesystem where the function vm_unmap_ram() may be called from an invalid context. Specifically, during testing with UFS backed virtual disks, the kernel sometimes reports that f2fs_release_decomp_mem() calls vm_unmap_ram() from a context where it is not allowed, such as an interrupt context where sleeping functions cannot be called. This can cause kernel warnings or bugs because vm_unmap_ram() is a sleeping function and should not be called when interrupts are disabled or in atomic contexts. The patch fixes this by modifying the in_task() check to also verify if interrupts are disabled, ensuring that pages are unmapped asynchronously in an interrupt handler.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to execute a sleeping function (vm_unmap_ram()) from an invalid context, such as an interrupt handler. This can lead to kernel warnings, instability, or crashes, potentially affecting system reliability and performance when using the F2FS filesystem with certain storage configurations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for kernel warnings related to vm_unmap_ram() being called from an invalid context. Specifically, look for messages similar to: 'BUG: sleeping function called from invalid context at mm/vmalloc.c:2978' along with call traces involving f2fs_release_decomp_mem() and vm_unmap_ram(). You can use the command 'dmesg | grep vm_unmap_ram' or 'journalctl -k | grep vm_unmap_ram' to find such messages in the kernel logs.