CVE-2025-39886
BaseFortify
Publication date: 2025-09-23
Last updated on: 2025-12-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15 (inc) to 6.6.107 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.48 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.16.8 (exc) |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's BPF subsystem where calling bpf_map_kmalloc_node() from __bpf_async_init() can cause various locking issues, such as double-acquiring the same lock (rq_lock), leading to a hardlockup. The problem arises because memcg (memory control group) accounting raises an MEMCG_MAX event during this process, which triggers cgroup_file_notify() while spinning is not allowed, causing deadlocks. The fix involves changing the allocation flags to use __GFP_HIGH instead of GFP_ATOMIC to prevent spinning and avoid calling cgroup_file_notify() in this context.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to deadlock (hardlockup) due to locking issues in the BPF subsystem when certain memory control group events occur. This can lead to system instability or crashes, impacting the availability and reliability of systems running vulnerable kernel versions.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by updating the Linux kernel to include the fix that changes __bpf_async_init() to use __GFP_HIGH instead of GFP_ATOMIC, which prevents locking issues related to memcg accounting and BPF timer initialization. Therefore, the immediate mitigation step is to apply the kernel patch or update to a kernel version that includes this fix.