CVE-2025-39992
BaseFortify
Publication date: 2025-10-15
Last updated on: 2025-10-16
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's memory management subsystem during a race condition between the fork() system call and the swapoff operation. Specifically, when duplicating a process's memory map (dup_mmap) during fork, a partially initialized memory map can be exposed to the swapoff operation. This leads to unuse_mm() encountering a zero entry marker (XA_ZERO_ENTRY) in the virtual memory areas (vmas) list, which it mistakenly treats as a valid vma. Accessing this zero entry causes a kernel NULL pointer dereference and results in a kernel crash (OOPS). The root cause is the exposure of a partially valid memory map before it is fully initialized.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (OOPS) due to a NULL pointer dereference in the Linux kernel. This can lead to system instability, unexpected reboots, or denial of service conditions on affected systems, potentially disrupting normal operations.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by ensuring that the kernel checks for a stable address space before operating on the VMA during swapoff. Immediate mitigation would involve updating the Linux kernel to a version that includes the fix for this issue, which involves checking the MMF_UNSTABLE flag in dup_mmap() to avoid exposing partially-initialized mm_structs. Until an update is applied, avoid operations that trigger swapoff concurrently with fork() to reduce the risk of hitting this race condition.