CVE-2025-39749
BaseFortify
Publication date: 2025-09-11
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
| linux | linux_kernel | 5.10.244-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a data race in the Linux kernel's RCU (Read-Copy-Update) subsystem. Specifically, on kernels built with CONFIG_IRQ_WORK=y, when rcu_read_unlock() is called within an interrupts-disabled region, it triggers an irq-work handler that updates a per-CPU field called defer_qs_iw_pending. Because irq-work handlers run with interrupts enabled, the handler can be interrupted by another RCU read-side critical section that also accesses this field, causing a data race. This race condition can lead to unpredictable behavior or kernel bugs. The fix disables interrupts during the critical update to prevent this race.
How can this vulnerability impact me? :
This vulnerability can cause data races in the Linux kernel's RCU subsystem, potentially leading to kernel instability, crashes, or unpredictable behavior. Such issues can affect system reliability and performance, especially on systems using affected kernel configurations. It may also complicate debugging and system maintenance due to subtle concurrency bugs.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by a kernel patch that disables interrupts across the portion of the rcu_preempt_deferred_qs_handler() that updates the ->defer_qs_iw_pending field. Immediate mitigation steps include updating your Linux kernel to a version that includes this fix. There are no specific configuration changes or commands provided to mitigate this vulnerability otherwise.