CVE-2025-39745

Source
https://cve.org/CVERecord?id=CVE-2025-39745
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39745.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39745
Downstream
Related
Published
2025-09-11T16:52:18.423Z
Modified
2026-02-25T09:15:35.590156093Z
Summary
rcutorture: Fix rcutorture_one_extend_check() splat in RT kernels
Details

In the Linux kernel, the following vulnerability has been resolved:

rcutorture: Fix rcutortureoneextend_check() splat in RT kernels

For built with CONFIGPREEMPTRT=y kernels, running rcutorture tests resulted in the following splat:

[ 68.797425] rcutortureoneextendcheck during change: Current 0x1 To add 0x1 To remove 0x0 preemptcount() 0x0 [ 68.797533] WARNING: CPU: 2 PID: 512 at kernel/rcu/rcutorture.c:1993 rcutortureoneextendcheck+0x419/0x560 [rcutorture] [ 68.797601] Call Trace: [ 68.797602] <TASK> [ 68.797619] ? lockdepsoftirqsoff+0xa5/0x160 [ 68.797631] rcutortureoneextend+0x18e/0xcc0 [rcutorture 2466dbd2ff34dbaa36049cb323a80c3306ac997c] [ 68.797646] ? localclock+0x19/0x40 [ 68.797659] rcutortureone_read+0xf0/0x280 [rcutorture 2466dbd2ff34dbaa36049cb323a80c3306ac997c] [ 68.797678] ? __pfxrcutortureoneread+0x10/0x10 [rcutorture 2466dbd2ff34dbaa36049cb323a80c3306ac997c] [ 68.797804] ? __pfxrcutorturetimer+0x10/0x10 [rcutorture 2466dbd2ff34dbaa36049cb323a80c3306ac997c] [ 68.797815] rcu-torture: rcutorturereader task started [ 68.797824] rcu-torture: Creating rcutorturereader task [ 68.797824] rcutorturereader+0x238/0x580 [rcutorture 2466dbd2ff34dbaa36049cb323a80c3306ac997c] [ 68.797836] ? kvmschedclockread+0x15/0x30

Disable BH does not change the SOFTIRQ corresponding bits in preemptcount() for RT kernels, this commit therefore use softirqcount() to check the if BH is disabled.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39745.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ec9d6356bfda69abe5f4767dd56c964127913233
Fixed
a85550267247cdf5e7499be00ea8e388ab014e50
Fixed
69c5ae0f441c2d72e8f48dc1e08464c172360c4c
Fixed
8d71351d88e478d3c4e945e3218e97ec677fd807

Affected versions

v6.*
v6.13
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.15
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.15.1
v6.15.10
v6.15.2
v6.15.3
v6.15.4
v6.15.5
v6.15.6
v6.15.7
v6.15.8
v6.15.9
v6.16
v6.16-rc1
v6.16-rc2
v6.16-rc3
v6.16-rc4
v6.16-rc5
v6.16-rc6
v6.16-rc7
v6.16.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39745.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.14.0
Fixed
6.15.11
Type
ECOSYSTEM
Events
Introduced
6.16.0
Fixed
6.16.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39745.json"