CVE-2025-39782
BaseFortify
Publication date: 2025-09-11
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | 5.10.244-1 |
| linux | kernel | 6.1.153-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a potential softlockup in the Linux kernel's jbd2 subsystem, specifically in the jbd2_log_do_checkpoint() function. The issue arises because this function does not explicitly call cond_resched() to yield the CPU during long operations, relying instead on other functions that may or may not sleep. If those functions do not sleep, the kernel can become stuck in a softlockup, where the CPU is busy but not making progress, causing system responsiveness issues.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to experience a softlockup, where a CPU core becomes stuck for an extended period (e.g., over 150 seconds) during journal checkpoint operations. This can lead to system unresponsiveness, degraded performance, or potential system hangs, impacting the stability and reliability of systems running affected kernel versions.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for kernel soft lockup warnings related to jbd2_log_do_checkpoint(). You can check the system logs for messages like 'watchdog: BUG: soft lockup' involving jbd2 functions. For example, use commands such as 'dmesg | grep -i softlockup' or 'journalctl -k | grep jbd2' to find relevant kernel messages indicating the issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where jbd2_log_do_checkpoint() explicitly calls cond_resched() to prevent softlockups. Until an update is applied, monitoring for soft lockup warnings and minimizing heavy writeback workloads may reduce the chance of encountering the issue.