-

CVE-2025-39953

In the Linux kernel, the following vulnerability has been resolved:

cgroup: split cgroup_destroy_wq into 3 workqueues

A hung task can occur during [1] LTP cgroup testing when repeatedly
mounting/unmounting perf_event and net_prio controllers with
systemd.unified_cgroup_hierarchy=1. The hang manifests in
cgroup_lock_and_drain_offline() during root destruction.

Related case:
cgroup_fj_function_perf_event cgroup_fj_function.sh perf_event
cgroup_fj_function_net_prio cgroup_fj_function.sh net_prio

Call Trace:
	cgroup_lock_and_drain_offline+0x14c/0x1e8
	cgroup_destroy_root+0x3c/0x2c0
	css_free_rwork_fn+0x248/0x338
	process_one_work+0x16c/0x3b8
	worker_thread+0x22c/0x3b0
	kthread+0xec/0x100
	ret_from_fork+0x10/0x20

Root Cause:

CPU0                            CPU1
mount perf_event                umount net_prio
cgroup1_get_tree                cgroup_kill_sb
rebind_subsystems               // root destruction enqueues
				// cgroup_destroy_wq
// kill all perf_event css
                                // one perf_event css A is dying
                                // css A offline enqueues cgroup_destroy_wq
                                // root destruction will be executed first
                                css_free_rwork_fn
                                cgroup_destroy_root
                                cgroup_lock_and_drain_offline
                                // some perf descendants are dying
                                // cgroup_destroy_wq max_active = 1
                                // waiting for css A to die

Problem scenario:
1. CPU0 mounts perf_event (rebind_subsystems)
2. CPU1 unmounts net_prio (cgroup_kill_sb), queuing root destruction work
3. A dying perf_event CSS gets queued for offline after root destruction
4. Root destruction waits for offline completion, but offline work is
   blocked behind root destruction in cgroup_destroy_wq (max_active=1)

Solution:
Split cgroup_destroy_wq into three dedicated workqueues:
cgroup_offline_wq – Handles CSS offline operations
cgroup_release_wq – Manages resource release
cgroup_free_wq – Performs final memory deallocation

This separation eliminates blocking in the CSS free path while waiting for
offline operations to complete.

[1] https://github.com/linux-test-project/ltp/blob/master/runtest/controllers

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < cabadd7fd15f97090f752fd22dd7f876a0dc3dc4
Version 334c3679ec4b2b113c35ebe37d2018b112dd5013
Status affected
Version < a0c896bda7077aa5005473e2c5b3c27173313b4c
Version 334c3679ec4b2b113c35ebe37d2018b112dd5013
Status affected
Version < f2795d1b92506e3adf52a298f7181032a1525e04
Version 334c3679ec4b2b113c35ebe37d2018b112dd5013
Status affected
Version < 993049c9b1355c78918344a6403427d53f9ee700
Version 334c3679ec4b2b113c35ebe37d2018b112dd5013
Status affected
Version < 4a1e3ec28e8062cd9f339aa6a942df9c5bcb6811
Version 334c3679ec4b2b113c35ebe37d2018b112dd5013
Status affected
Version < ded4d207a3209a834b6831ceec7f39b934c74802
Version 334c3679ec4b2b113c35ebe37d2018b112dd5013
Status affected
Version < 05e0b03447cf215ec384210441b34b7a3b16e8b0
Version 334c3679ec4b2b113c35ebe37d2018b112dd5013
Status affected
Version < 79f919a89c9d06816dbdbbd168fa41d27411a7f9
Version 334c3679ec4b2b113c35ebe37d2018b112dd5013
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.6
Status affected
Version < 4.6
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.300
Status unaffected
Version <= 5.10.*
Version 5.10.245
Status unaffected
Version <= 5.15.*
Version 5.15.194
Status unaffected
Version <= 6.1.*
Version 6.1.154
Status unaffected
Version <= 6.6.*
Version 6.6.108
Status unaffected
Version <= 6.12.*
Version 6.12.49
Status unaffected
Version <= 6.16.*
Version 6.16.9
Status unaffected
Version <= *
Version 6.17
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.053
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String