-

CVE-2025-39736

In the Linux kernel, the following vulnerability has been resolved:

mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock

When netpoll is enabled, calling pr_warn_once() while holding
kmemleak_lock in mem_pool_alloc() can cause a deadlock due to lock
inversion with the netconsole subsystem.  This occurs because
pr_warn_once() may trigger netpoll, which eventually leads to
__alloc_skb() and back into kmemleak code, attempting to reacquire
kmemleak_lock.

This is the path for the deadlock.

mem_pool_alloc()
  -> raw_spin_lock_irqsave(&kmemleak_lock, flags);
      -> pr_warn_once()
          -> netconsole subsystem
	     -> netpoll
	         -> __alloc_skb
		   -> __create_object
		     -> raw_spin_lock_irqsave(&kmemleak_lock, flags);

Fix this by setting a flag and issuing the pr_warn_once() after
kmemleak_lock is released.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < c7b6ea0ede687e7460e593c5ea478f50aa41682a
Version c5665868183fec689dbab9fb8505188b2c4f0757
Status affected
Version < 4b0151e1d468eb2667c37b7af99b3c075072d334
Version c5665868183fec689dbab9fb8505188b2c4f0757
Status affected
Version < f249d32bb54876b4b6c3ae071af8ddca77af390b
Version c5665868183fec689dbab9fb8505188b2c4f0757
Status affected
Version < 62879faa8efe8d8a9c7bf7606ee9c068012d7dac
Version c5665868183fec689dbab9fb8505188b2c4f0757
Status affected
Version < 1da95d3d4b7b1d380ebd87b71a61e7e6aed3265d
Version c5665868183fec689dbab9fb8505188b2c4f0757
Status affected
Version < a0854de00ce2ee27edf39037e7836ad580eb3350
Version c5665868183fec689dbab9fb8505188b2c4f0757
Status affected
Version < 08f70be5e406ce47c822f2dd11c1170ca259605b
Version c5665868183fec689dbab9fb8505188b2c4f0757
Status affected
Version < a181b228b37a6a5625dad2bb4265bb7abb673e9f
Version c5665868183fec689dbab9fb8505188b2c4f0757
Status affected
Version < 47b0f6d8f0d2be4d311a49e13d2fd5f152f492b2
Version c5665868183fec689dbab9fb8505188b2c4f0757
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.4
Status affected
Version < 5.4
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.149
Status unaffected
Version <= 6.6.*
Version 6.6.103
Status unaffected
Version <= 6.12.*
Version 6.12.43
Status unaffected
Version <= 6.15.*
Version 6.15.11
Status unaffected
Version <= 6.16.*
Version 6.16.2
Status unaffected
Version <= *
Version 6.17-rc2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.125
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String