CVE-2025-39700
BaseFortify
Publication date: 2025-09-05
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1284 | The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's memory management subsystem, specifically in the damon_migrate_pages() function. The function attempts to migrate memory pages to a target node without verifying if the target node is valid. If an invalid node is specified, it can cause a kernel BUG, leading to a crash or system instability due to an unhandled page fault in kernel mode.
How can this vulnerability impact me? :
If exploited or triggered by invalid migration requests, this vulnerability can cause the Linux kernel to crash or become unstable, resulting in denial of service. This can disrupt system operations and potentially lead to data loss or downtime.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for kernel BUG messages related to damon_migrate_pages() and invalid node migration requests. Specifically, look for kernel Oops or BUG messages similar to: [ 7831.883495] BUG: unable to handle page fault for address: ... [ 7831.885468] Oops: Oops: 0000 [#1] SMP PTI [ 7831.886913] CPU: ... Comm: kdamond.0 ... You can use commands like: 1. dmesg | grep -i 'BUG\|Oops\|damon_migrate_pages' 2. journalctl -k | grep -i 'BUG\|Oops\|damon_migrate_pages' These commands help identify if the kernel has encountered the specific bug triggered by invalid migration requests.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability immediately, ensure that any user or process making migration requests via DAMOS_MIGRATE_{HOT,COLD} actions only targets valid nodes. Since the vulnerability arises from invalid node migration requests, validating or restricting such requests can prevent the kernel BUG. Additionally, update the Linux kernel to a version that includes the patch adding the target node validity check in damon_migrate_pages(), as this resolves the issue.