CVE-2025-39775
BaseFortify
Publication date: 2025-09-11
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.13 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The impact of this vulnerability is primarily the triggering of kernel warnings (WARN) during certain memory remapping operations involving userfaultd and VMAs spanning PMDs. While these warnings do not cause incorrect behavior or crashes, they can be disruptive, potentially cluttering system logs and making debugging more difficult. There is no indication that this leads to security breaches or system instability.
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's memory management subsystem, specifically in the mm/mremap component. When userfaultd is registered on a virtual memory area (VMA) that spans at least one Page Middle Directory (PMD) and then mremap() is called on that VMA, it can trigger a kernel warning (WARN) during recovery from a failed page table move caused by a page table allocation error. The issue arises because the recovery code does not recurse properly during the page table move, leading to an unpleasant warning message, although the kernel ultimately handles the situation correctly. The fix involves adding checks and recursion during recovery to avoid triggering the warning.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for WARN messages related to mm/mremap, specifically warnings like: "WARNING: CPU: ... at mm/mremap.c:357 move_normal_pmd". You can use commands such as 'dmesg | grep mm/mremap' or 'journalctl -k | grep mm/mremap' to look for these warnings in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this issue is fixed, as the vulnerability is resolved by a code change in the mm/mremap subsystem. Until then, monitoring for the WARN messages and avoiding workloads that trigger userfaultd on VMAs spanning PMDs and subsequent mremap operations may reduce exposure.