CVE-2025-39737
BaseFortify
Publication date: 2025-09-11
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10.244 |
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a soft lockup in the Linux kernel's kmemleak feature during cleanup. When kmemleak tries to remove and delete a large number of memory leak objects (around 40,000) one-by-one in a loop, it can cause the CPU to become stuck for a long time (soft lockup) because of the slow processing and locking mechanisms. The fix involves periodically yielding the CPU during this cleanup loop to prevent the system from becoming unresponsive.
How can this vulnerability impact me? :
This vulnerability can cause a soft lockup, meaning the CPU can become stuck for an extended period during kmemleak cleanup, potentially leading to system unresponsiveness or degraded performance on systems running debug kernels with kmemleak enabled and large memory workloads.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing soft lockup warnings related to kmemleak in the system logs. Specifically, look for messages like 'watchdog: BUG: soft lockup - CPU#X stuck for XXs! [kworker/X:X:PID]' when running a debug kernel with kmemleak enabled. Monitoring kernel logs with commands such as 'dmesg | grep -i soft lockup' or 'journalctl -k | grep -i kmemleak' can help identify this issue.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the kernel includes the fix which calls cond_resched() periodically in the kmemleak cleanup loop to avoid soft lockups. If running a debug kernel with kmemleak enabled, consider adjusting the CONFIG_DEBUG_KMEMLEAK_MEM_POOL_SIZE to a lower value to reduce the number of kmemleak objects processed at once. Additionally, monitoring and managing workloads that involve hot unplug operations in parallel with kmemleak can help reduce the chance of triggering this issue.