-

CVE-2025-39909

In the Linux kernel, the following vulnerability has been resolved:

mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()

Patch series "mm/damon: avoid divide-by-zero in DAMON module's parameters
application".

DAMON's RECLAIM and LRU_SORT modules perform no validation on
user-configured parameters during application, which may lead to
division-by-zero errors.

Avoid the divide-by-zero by adding validation checks when DAMON modules
attempt to apply the parameters.


This patch (of 2):

During the calculation of 'hot_thres' and 'cold_thres', either
'sample_interval' or 'aggr_interval' is used as the divisor, which may
lead to division-by-zero errors.  Fix it by directly returning -EINVAL
when such a case occurs.  Additionally, since 'aggr_interval' is already
required to be set no smaller than 'sample_interval' in damon_set_attrs(),
only the case where 'sample_interval' is zero needs to be checked.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 74e391f7da7d9d5235a3cca88ee9fc18f720c75b
Version 40e983cca9274e177bd5b9379299b44d9536ac68
Status affected
Version < 7bb675c9f0257840d33e5d1337d7e3afdd74a6bf
Version 40e983cca9274e177bd5b9379299b44d9536ac68
Status affected
Version < af0ae62b935317bed1a1361c8c9579db9d300e70
Version 40e983cca9274e177bd5b9379299b44d9536ac68
Status affected
Version < 326a4b3750c71af3f3c52399ec4dbe33b6da4c26
Version 40e983cca9274e177bd5b9379299b44d9536ac68
Status affected
Version < 711f19dfd783ffb37ca4324388b9c4cb87e71363
Version 40e983cca9274e177bd5b9379299b44d9536ac68
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 6.0
Status affected
Version < 6.0
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.153
Status unaffected
Version <= 6.6.*
Version 6.6.107
Status unaffected
Version <= 6.12.*
Version 6.12.48
Status unaffected
Version <= 6.16.*
Version 6.16.8
Status unaffected
Version <= *
Version 6.17
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.05
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String