| Release Date: | 2025-09-11 | |
| Impact: | Moderate | What is this? | 
In the Linux kernel, the following vulnerability has been resolved:
rcu: Protect ->defer_qs_iw_pending from data race
On kernels built with CONFIG_IRQ_WORK=y, when rcu_read_unlock() is
invoked within an interrupts-disabled region of code [1], it will invoke
rcu_read_unlock_special(), which uses an irq-work handler to force the
system to notice when the RCU read-side critical section actually ends.
That end won't happen until interrupts are enabled at the soonest.
In some kernels, such as those booted with rcutree.use_softirq=y, the
irq-work handler is used unconditionally.
The per-CPU rcu_data structure's ->defer_qs_iw_pending field is
updated by the irq-work handler and is both read and updated by
rcu_read_unlock_special().  This resulted in the following KCSAN splat:
------------------------------------------------------------------------
BUG: KCSAN: data-race in rcu_preempt_deferred_qs_handler / rcu_read_unlock_special
read to 0xffff96b95f42d8d8 of 1 bytes by task 90 on cpu 8:
 rcu_read_unlock_special+0x175/0x260
 __rcu_read_unlock+0x92/0xa0
 rt_spin_unlock+0x9b/0xc0
 __local_bh_enable+0x10d/0x170
 __local_bh_enable_ip+0xfb/0x150
 rcu_do_batch+0x595/0xc40
 rcu_cpu_kthread+0x4e9/0x830
 smpboot_thread_fn+0x24d/0x3b0
 kthread+0x3bd/0x410
 ret_from_fork+0x35/0x40
 ret_from_fork_asm+0x1a/0x30
write to 0xffff96b95f42d8d8 of 1 bytes by task 88 on cpu 8:
 rcu_preempt_deferred_qs_handler+0x1e/0x30
 irq_work_single+0xaf/0x160
 run_irq_workd+0x91/0xc0
 smpboot_thread_fn+0x24d/0x3b0
 kthread+0x3bd/0x410
 ret_from_fork+0x35/0x40
 ret_from_fork_asm+0x1a/0x30
no locks held by irq_work/8/88.
irq event stamp: 200272
hardirqs last  enabled at (200272): [
See more information about CVE-2025-39749 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
| Base Score: | 5.5 | 
| Vector String: | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | 
| Version: | 3.1 | 
| Attack Vector: | Local | 
| Attack Complexity: | Low | 
| Privileges Required: | Low | 
| User Interaction: | None | 
| Scope: | Unchanged | 
| Confidentiality Impact: | None | 
| Integrity Impact: | None | 
| Availability Impact: | High | 
| Platform | Errata | Release Date | 
| Oracle Linux version 10 (kernel-uek) | ELSA-2025-20662 | 2025-10-14 | 
| Oracle Linux version 7 (kernel-uek) | ELSA-2025-20663 | 2025-10-11 | 
| Oracle Linux version 8 (kernel-uek) | ELSA-2025-20663 | 2025-10-11 | 
| Oracle Linux version 9 (kernel-uek) | ELSA-2025-20662 | 2025-10-14 | 
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: