๐Ÿ” CVE Alert

CVE-2025-39736

UNKNOWN 0.0

mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock When netpoll is enabled, calling pr_warn_once() while holding kmemleak_lock in mem_pool_alloc() can cause a deadlock due to lock inversion with the netconsole subsystem. This occurs because pr_warn_once() may trigger netpoll, which eventually leads to __alloc_skb() and back into kmemleak code, attempting to reacquire kmemleak_lock. This is the path for the deadlock. mem_pool_alloc() -> raw_spin_lock_irqsave(&kmemleak_lock, flags); -> pr_warn_once() -> netconsole subsystem -> netpoll -> __alloc_skb -> __create_object -> raw_spin_lock_irqsave(&kmemleak_lock, flags); Fix this by setting a flag and issuing the pr_warn_once() after kmemleak_lock is released.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 11, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
c5665868183fec689dbab9fb8505188b2c4f0757 < c7b6ea0ede687e7460e593c5ea478f50aa41682a c5665868183fec689dbab9fb8505188b2c4f0757 < 4b0151e1d468eb2667c37b7af99b3c075072d334 c5665868183fec689dbab9fb8505188b2c4f0757 < f249d32bb54876b4b6c3ae071af8ddca77af390b c5665868183fec689dbab9fb8505188b2c4f0757 < 62879faa8efe8d8a9c7bf7606ee9c068012d7dac c5665868183fec689dbab9fb8505188b2c4f0757 < 1da95d3d4b7b1d380ebd87b71a61e7e6aed3265d c5665868183fec689dbab9fb8505188b2c4f0757 < a0854de00ce2ee27edf39037e7836ad580eb3350 c5665868183fec689dbab9fb8505188b2c4f0757 < 08f70be5e406ce47c822f2dd11c1170ca259605b c5665868183fec689dbab9fb8505188b2c4f0757 < a181b228b37a6a5625dad2bb4265bb7abb673e9f c5665868183fec689dbab9fb8505188b2c4f0757 < 47b0f6d8f0d2be4d311a49e13d2fd5f152f492b2
Linux / Linux
5.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c7b6ea0ede687e7460e593c5ea478f50aa41682a git.kernel.org: https://git.kernel.org/stable/c/4b0151e1d468eb2667c37b7af99b3c075072d334 git.kernel.org: https://git.kernel.org/stable/c/f249d32bb54876b4b6c3ae071af8ddca77af390b git.kernel.org: https://git.kernel.org/stable/c/62879faa8efe8d8a9c7bf7606ee9c068012d7dac git.kernel.org: https://git.kernel.org/stable/c/1da95d3d4b7b1d380ebd87b71a61e7e6aed3265d git.kernel.org: https://git.kernel.org/stable/c/a0854de00ce2ee27edf39037e7836ad580eb3350 git.kernel.org: https://git.kernel.org/stable/c/08f70be5e406ce47c822f2dd11c1170ca259605b git.kernel.org: https://git.kernel.org/stable/c/a181b228b37a6a5625dad2bb4265bb7abb673e9f git.kernel.org: https://git.kernel.org/stable/c/47b0f6d8f0d2be4d311a49e13d2fd5f152f492b2 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html