-

CVE-2025-39737

In the Linux kernel, the following vulnerability has been resolved:

mm/kmemleak: avoid soft lockup in __kmemleak_do_cleanup()

A soft lockup warning was observed on a relative small system x86-64
system with 16 GB of memory when running a debug kernel with kmemleak
enabled.

  watchdog: BUG: soft lockup - CPU#8 stuck for 33s! [kworker/8:1:134]

The test system was running a workload with hot unplug happening in
parallel.  Then kemleak decided to disable itself due to its inability to
allocate more kmemleak objects.  The debug kernel has its
CONFIG_DEBUG_KMEMLEAK_MEM_POOL_SIZE set to 40,000.

The soft lockup happened in kmemleak_do_cleanup() when the existing
kmemleak objects were being removed and deleted one-by-one in a loop via a
workqueue.  In this particular case, there are at least 40,000 objects
that need to be processed and given the slowness of a debug kernel and the
fact that a raw_spinlock has to be acquired and released in
__delete_object(), it could take a while to properly handle all these
objects.

As kmemleak has been disabled in this case, the object removal and
deletion process can be further optimized as locking isn't really needed. 
However, it is probably not worth the effort to optimize for such an edge
case that should rarely happen.  So the simple solution is to call
cond_resched() at periodic interval in the iteration loop to avoid soft
lockup.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 9f1f4e95031f84867c5821540466d62f88dab8ca
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 1ef72a7fedc5bca70e8cc980985790de10d407aa
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < a04de4c40aab9b338dfa989cf4aec70fd187eeb2
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < f014c10d190b92aad366e56b445daffcd1c075e4
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < e21a3ddd58733ce31afcb1e5dc3cb80a4b5bc29b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 8d2d22a55ffe35c38e69795468a7addd1a80e9ce
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 926092268efdf1ed7b55cf486356c74a9e7710d1
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 9b80430c194e4a114dc663c1025d56b4f3d0153d
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < d1534ae23c2b6be350c8ab060803fbf6e9682adc
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.149
Status unaffected
Version <= 6.6.*
Version 6.6.103
Status unaffected
Version <= 6.12.*
Version 6.12.43
Status unaffected
Version <= 6.15.*
Version 6.15.11
Status unaffected
Version <= 6.16.*
Version 6.16.2
Status unaffected
Version <= *
Version 6.17-rc2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.125
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string