In the Linux kernel, the following vulnerability has been resolved:
kasan: remove kasanfindvm_area() to prevent possible deadlock
findvmarea() couldn't be called in atomiccontext. If findvm_area() is called to reports vm area information, kasan can trigger deadlock like:
CPU0 CPU1 vmalloc(); allocvmaparea(); spinlock(&vn->busy.lock) spinlockbh(&somelock); <interrupt occurs> <in softirq> spinlock(&somelock); <access invalid address> kasanreport(); printreport(); printaddressdescription(); kasanfindvmarea(); findvmarea(); spinlock(&vn->busy.lock) // deadlock!
To prevent possible deadlock while kasan reports, remove kasanfindvm_area().
[
{
"digest": {
"length": 1047.0,
"function_hash": "37476487589144994078351388986356549116"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6ee9b3d84775944fb8c8a447961cd01274ac671c",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "mm/kasan/report.c",
"function": "print_address_description"
},
"signature_type": "Function",
"id": "CVE-2025-38510-43ca9165"
},
{
"digest": {
"length": 266.0,
"function_hash": "4220073102565858349552598122423791283"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6ee9b3d84775944fb8c8a447961cd01274ac671c",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "mm/kasan/report.c",
"function": "kasan_find_vm_area"
},
"signature_type": "Function",
"id": "CVE-2025-38510-4a3e8a74"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"110660439622306808425907262553000710764",
"12145944810961613077743558622958748992",
"180899591240906204224563621015813323292",
"248924229507607869798890641637487147888",
"137265742362703945614487191797432298725",
"321522613493362670082332328617349304621",
"147494797353921414355366812958009181032",
"34183638488614004956075239481451670235",
"218554153510722854338838372854191273921",
"284248322946230979236712878434032887147",
"59915117023245444875949846511201781453",
"53261682775688205021076615684540231393",
"159725845304569929990564954393732446978",
"332994144346543540626917242931822739797",
"250504385350876330738413454111473934855",
"215994172062309148569352752114817406664",
"298423115297350523375254754603913157149",
"149615672458540506783455227327402669371",
"81728579579233882662544782198216106117",
"193265002914535212629163356759821086753",
"275683484673358220119725450560605857827",
"237272846174635763936396998775842629566",
"324312937732194187088319381417559243634",
"30816664029633435243513936206066190136",
"89346941853514416886341690185718836530",
"7446526909822671199368806075096824751",
"54736381648567955885395006789871235820"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6ee9b3d84775944fb8c8a447961cd01274ac671c",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "mm/kasan/report.c"
},
"signature_type": "Line",
"id": "CVE-2025-38510-bb6cd684"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"150215298824316965723442592254048985454",
"33542934671960268887393554232720726802",
"30172321540796185194218569502771314137",
"131416178729986073612358450808751615920",
"81728579579233882662544782198216106117",
"193265002914535212629163356759821086753",
"275683484673358220119725450560605857827",
"109608815217116532360214676070776491260",
"271377275423884679014395258263563965720",
"72278412934794839087307949539160358028",
"54736381648567955885395006789871235820"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2d89dab1ea6086e6cbe6fe92531b496fb6808cb9",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "mm/kasan/report.c"
},
"signature_type": "Line",
"id": "CVE-2025-38510-cbccc0fc"
},
{
"digest": {
"length": 952.0,
"function_hash": "266535789285530080788797009580526330193"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2d89dab1ea6086e6cbe6fe92531b496fb6808cb9",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "mm/kasan/report.c",
"function": "print_address_description"
},
"signature_type": "Function",
"id": "CVE-2025-38510-ebf503f7"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"150215298824316965723442592254048985454",
"33542934671960268887393554232720726802",
"30172321540796185194218569502771314137",
"131416178729986073612358450808751615920",
"81728579579233882662544782198216106117",
"193265002914535212629163356759821086753",
"275683484673358220119725450560605857827",
"109608815217116532360214676070776491260",
"271377275423884679014395258263563965720",
"72278412934794839087307949539160358028",
"54736381648567955885395006789871235820"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@595f78d99b9051600233c0a5c4c47e1097e6ed01",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "mm/kasan/report.c"
},
"signature_type": "Line",
"id": "CVE-2025-38510-ef3de352"
},
{
"digest": {
"length": 952.0,
"function_hash": "266535789285530080788797009580526330193"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@595f78d99b9051600233c0a5c4c47e1097e6ed01",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "mm/kasan/report.c",
"function": "print_address_description"
},
"signature_type": "Function",
"id": "CVE-2025-38510-f2123e90"
}
]