CVE-2025-39725
BaseFortify
Publication date: 2025-09-05
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's memory management system, specifically in the handling of hardware-poisoned large memory pages (folios) during memory reclamation. When the system tries to reclaim memory from a large folio that has been marked as hardware-poisoned, the existing function unmap_poisoned_folio() cannot properly handle large folios, leading to a null pointer dereference and potentially triggering a kernel panic. The issue arises from a race condition between memory reclaim and memory failure handling, where the large folio is not correctly unmapped, causing system instability.
How can this vulnerability impact me? :
This vulnerability can cause a kernel panic, which is a critical system crash in the Linux kernel. Such a crash can lead to system downtime, data loss, and disruption of services running on the affected system. Since it involves memory management, it can affect system stability and reliability, especially under conditions where memory errors and reclamation occur simultaneously.