CVE-2025-39909
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's DAMON module, specifically in the RECLAIM and LRU_SORT components. These modules do not validate user-configured parameters properly, which can lead to a division-by-zero error during calculations involving 'sample_interval' or 'aggr_interval'. The issue is fixed by adding validation checks to prevent division by zero, returning an error when 'sample_interval' is zero.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to encounter a division-by-zero error, which may lead to kernel crashes or instability. This can affect system reliability and availability, potentially causing denial of service or unexpected behavior in systems relying on the DAMON module.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that adds validation checks to the DAMON module parameters to avoid division-by-zero errors. Specifically, ensure that the 'sample_interval' parameter is not set to zero, as the patch returns an error (-EINVAL) if this occurs. Updating the Linux kernel to the fixed version containing this patch is the recommended mitigation.