Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:21926

Опубликовано: 28 нояб. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: mm: slub: avoid wake up kswapd in set_track_prepare (CVE-2025-39843)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
kernelx86_64611.9.1.el9_7kernel-5.14.0-611.9.1.el9_7.x86_64.rpm
kernel-abi-stablelistsnoarch611.9.1.el9_7kernel-abi-stablelists-5.14.0-611.9.1.el9_7.noarch.rpm
kernel-abi-stablelistsnoarch611.9.1.el9_7kernel-abi-stablelists-5.14.0-611.9.1.el9_7.noarch.rpm
kernel-corex86_64611.9.1.el9_7kernel-core-5.14.0-611.9.1.el9_7.x86_64.rpm
kernel-debugx86_64611.9.1.el9_7kernel-debug-5.14.0-611.9.1.el9_7.x86_64.rpm
kernel-debug-corex86_64611.9.1.el9_7kernel-debug-core-5.14.0-611.9.1.el9_7.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64611.9.1.el9_7kernel-debuginfo-common-x86_64-5.14.0-611.9.1.el9_7.x86_64.rpm
kernel-debug-modulesx86_64611.9.1.el9_7kernel-debug-modules-5.14.0-611.9.1.el9_7.x86_64.rpm
kernel-debug-modules-corex86_64611.9.1.el9_7kernel-debug-modules-core-5.14.0-611.9.1.el9_7.x86_64.rpm
kernel-debug-modules-extrax86_64611.9.1.el9_7kernel-debug-modules-extra-5.14.0-611.9.1.el9_7.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: mm: slub: avoid wake up kswapd in set_track_prepare set_track_prepare() can incur lock recursion. The issue is that it is called from hrtimer_start_range_ns holding the per_cpu(hrtimer_bases)[n].lock, but when enabled CONFIG_DEBUG_OBJECTS_TIMERS, may wake up kswapd in set_track_prepare, and try to hold the per_cpu(hrtimer_bases)[n].lock. Avoid deadlock caused by implicitly waking up kswapd by passing in allocation flags, which do not contain __GFP_KSWAPD_RECLAIM in the debug_objects_fill_pool() case. Inside stack depot they are processed by gfp_nested_mask(). Since ___slab_alloc() has preemption disabled, we mask out __GFP_DIRECT_RECLAIM from the flags there. The oops looks something like: BUG: spinlock recursion on CPU#3, swapper/3/0 lock: 0xffffff8a4bf29c80, .magic: dead4ead, .owner: swapper/3/0, .owner_cpu: 3 Hardware name: Qualcomm Technologies, Inc. Popsicle based on SM8850 (DT) Call trace: spin_bug+0x0 _raw_sp...

CVSS3: 7
redhat
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: mm: slub: avoid wake up kswapd in set_track_prepare set_track_prepare() can incur lock recursion. The issue is that it is called from hrtimer_start_range_ns holding the per_cpu(hrtimer_bases)[n].lock, but when enabled CONFIG_DEBUG_OBJECTS_TIMERS, may wake up kswapd in set_track_prepare, and try to hold the per_cpu(hrtimer_bases)[n].lock. Avoid deadlock caused by implicitly waking up kswapd by passing in allocation flags, which do not contain __GFP_KSWAPD_RECLAIM in the debug_objects_fill_pool() case. Inside stack depot they are processed by gfp_nested_mask(). Since ___slab_alloc() has preemption disabled, we mask out __GFP_DIRECT_RECLAIM from the flags there. The oops looks something like: BUG: spinlock recursion on CPU#3, swapper/3/0 lock: 0xffffff8a4bf29c80, .magic: dead4ead, .owner: swapper/3/0, .owner_cpu: 3 Hardware name: Qualcomm Technologies, Inc. Popsicle based on SM8850 (DT) Call trace: spin_bug+0x0 _raw_sp...

nvd
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: mm: slub: avoid wake up kswapd in set_track_prepare set_track_prepare() can incur lock recursion. The issue is that it is called from hrtimer_start_range_ns holding the per_cpu(hrtimer_bases)[n].lock, but when enabled CONFIG_DEBUG_OBJECTS_TIMERS, may wake up kswapd in set_track_prepare, and try to hold the per_cpu(hrtimer_bases)[n].lock. Avoid deadlock caused by implicitly waking up kswapd by passing in allocation flags, which do not contain __GFP_KSWAPD_RECLAIM in the debug_objects_fill_pool() case. Inside stack depot they are processed by gfp_nested_mask(). Since ___slab_alloc() has preemption disabled, we mask out __GFP_DIRECT_RECLAIM from the flags there. The oops looks something like: BUG: spinlock recursion on CPU#3, swapper/3/0 lock: 0xffffff8a4bf29c80, .magic: dead4ead, .owner: swapper/3/0, .owner_cpu: 3 Hardware name: Qualcomm Technologies, Inc. Popsicle based on SM8850 (DT) Call trace: spin_bug+0x0 _raw

msrc
3 месяца назад

mm: slub: avoid wake up kswapd in set_track_prepare

debian
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: m ...