-
CVE-2025-39909
- EPSS 0.02%
- Veröffentlicht 01.10.2025 08:15:33
- Zuletzt bearbeitet 02.10.2025 19:12:17
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() Patch series "mm/damon: avoid divide-by-zero in DAMON module's parameters application". DAMON's RECLAIM and LRU_SORT modules perform no validation on user-configured parameters during application, which may lead to division-by-zero errors. Avoid the divide-by-zero by adding validation checks when DAMON modules attempt to apply the parameters. This patch (of 2): During the calculation of 'hot_thres' and 'cold_thres', either 'sample_interval' or 'aggr_interval' is used as the divisor, which may lead to division-by-zero errors. Fix it by directly returning -EINVAL when such a case occurs. Additionally, since 'aggr_interval' is already required to be set no smaller than 'sample_interval' in damon_set_attrs(), only the case where 'sample_interval' is zero needs to be checked.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
74e391f7da7d9d5235a3cca88ee9fc18f720c75b
Version
40e983cca9274e177bd5b9379299b44d9536ac68
Status
affected
Version <
7bb675c9f0257840d33e5d1337d7e3afdd74a6bf
Version
40e983cca9274e177bd5b9379299b44d9536ac68
Status
affected
Version <
af0ae62b935317bed1a1361c8c9579db9d300e70
Version
40e983cca9274e177bd5b9379299b44d9536ac68
Status
affected
Version <
326a4b3750c71af3f3c52399ec4dbe33b6da4c26
Version
40e983cca9274e177bd5b9379299b44d9536ac68
Status
affected
Version <
711f19dfd783ffb37ca4324388b9c4cb87e71363
Version
40e983cca9274e177bd5b9379299b44d9536ac68
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.0
Status
affected
Version <
6.0
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.153
Status
unaffected
Version <=
6.6.*
Version
6.6.107
Status
unaffected
Version <=
6.12.*
Version
6.12.48
Status
unaffected
Version <=
6.16.*
Version
6.16.8
Status
unaffected
Version <=
*
Version
6.17
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.05 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|