CVE-2025-39744
BaseFortify
Publication date: 2025-09-11
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a deadlock issue in the Linux kernel's rcu_read_unlock() function caused by improper handling of IRQ work during irq_exit(). Specifically, when rcu_read_unlock_special() is called during irq_exit(), an inter-processor interrupt (IPI) can trigger the irq_exit() path again, causing a recursive lockup. This happens because the IPI itself triggers irq_exit(), leading to a deadloop. The issue was discovered when running a BPF program on the trace_tick_stop() tracepoint and fixed by correctly managing the irq_work state.
How can this vulnerability impact me? :
This vulnerability can cause the system to hang or lock up, particularly during boot or when running certain BPF programs that trigger the affected code path. This can lead to denial of service as the kernel becomes unresponsive due to the deadlock.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the rcu_read_unlock() deadloop issue in the Linux kernel by correctly managing the irq_work state. This involves updating the kernel to a version that includes the fix for CVE-2025-39744.