Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-39843— mm: slub: avoid wake up kswapd in set_track_prepare

EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-39843

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
mm: slub: avoid wake up kswapd in set_track_prepare
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: mm: slub: avoid wake up kswapd in set_track_prepare set_track_prepare() can incur lock recursion. The issue is that it is called from hrtimer_start_range_ns holding the per_cpu(hrtimer_bases)[n].lock, but when enabled CONFIG_DEBUG_OBJECTS_TIMERS, may wake up kswapd in set_track_prepare, and try to hold the per_cpu(hrtimer_bases)[n].lock. Avoid deadlock caused by implicitly waking up kswapd by passing in allocation flags, which do not contain __GFP_KSWAPD_RECLAIM in the debug_objects_fill_pool() case. Inside stack depot they are processed by gfp_nested_mask(). Since ___slab_alloc() has preemption disabled, we mask out __GFP_DIRECT_RECLAIM from the flags there. The oops looks something like: BUG: spinlock recursion on CPU#3, swapper/3/0 lock: 0xffffff8a4bf29c80, .magic: dead4ead, .owner: swapper/3/0, .owner_cpu: 3 Hardware name: Qualcomm Technologies, Inc. Popsicle based on SM8850 (DT) Call trace: spin_bug+0x0 _raw_spin_lock_irqsave+0x80 hrtimer_try_to_cancel+0x94 task_contending+0x10c enqueue_dl_entity+0x2a4 dl_server_start+0x74 enqueue_task_fair+0x568 enqueue_task+0xac do_activate_task+0x14c ttwu_do_activate+0xcc try_to_wake_up+0x6c8 default_wake_function+0x20 autoremove_wake_function+0x1c __wake_up+0xac wakeup_kswapd+0x19c wake_all_kswapds+0x78 __alloc_pages_slowpath+0x1ac __alloc_pages_noprof+0x298 stack_depot_save_flags+0x6b0 stack_depot_save+0x14 set_track_prepare+0x5c ___slab_alloc+0xccc __kmalloc_cache_noprof+0x470 __set_page_owner+0x2bc post_alloc_hook[jt]+0x1b8 prep_new_page+0x28 get_page_from_freelist+0x1edc __alloc_pages_noprof+0x13c alloc_slab_page+0x244 allocate_slab+0x7c ___slab_alloc+0x8e8 kmem_cache_alloc_noprof+0x450 debug_objects_fill_pool+0x22c debug_object_activate+0x40 enqueue_hrtimer[jt]+0xdc hrtimer_start_range_ns+0x5f8 ...
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于set_track_prepare函数可能导致锁递归,当启用CONFIG_DEBUG_OBJECTS_TIMERS时可能唤醒kswapd并尝试持有相同锁,从而造成死锁。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 5cf909c553e9efed573811de4b3f5172898d5515 ~ 994b03b9605d36d814c611385fbf90ca6db20aa8 -
LinuxLinux 5.19 -

II. Public POCs for CVE-2025-39843

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-39843

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-09-19 · 30 CVEs total

CVE-2025-39851vxlan: Fix NPD when refreshing an FDB entry with a nexthop object
CVE-2025-39837platform/x86: asus-wmi: Fix racy registrations
CVE-2025-39838cifs: prevent NULL pointer dereference in UTF16 conversion
CVE-2025-39839batman-adv: fix OOB read/write in network-coding decode
CVE-2025-39840audit: fix out-of-bounds read in audit_compare_dname_path()
CVE-2025-39841scsi: lpfc: Fix buffer free/clear order in deferred receive path
CVE-2025-39842ocfs2: prevent release journal inode after journal shutdown
CVE-2025-39844mm: move page table sync declarations to linux/pgtable.h
CVE-2025-39845x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings()
CVE-2025-39846pcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region()
CVE-2025-39847ppp: fix memory leak in pad_compress_skb
CVE-2025-39848ax25: properly unshare skbs in ax25_kiss_rcv()
CVE-2025-39849wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()
CVE-2025-39850vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects
CVE-2025-39852net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6
CVE-2025-39866fs: writeback: fix use-after-free in __mark_inode_dirty()
CVE-2025-39853i40e: Fix potential invalid access when MAC list is empty
CVE-2025-39854ice: fix NULL access of tx->in_use in ice_ll_ts_intr
CVE-2025-39856net: ethernet: ti: am65-cpsw-nuss: Fix null pointer dereference for ndev
CVE-2025-39855ice: fix NULL access of tx->in_use in ice_ptp_ts_irq

Showing top 20 of 30 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-39843

No comments yet


Leave a comment