-

CVE-2025-39909

In the Linux kernel, the following vulnerability has been resolved:

mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()

Patch series "mm/damon: avoid divide-by-zero in DAMON module's parameters
application".

DAMON's RECLAIM and LRU_SORT modules perform no validation on
user-configured parameters during application, which may lead to
division-by-zero errors.

Avoid the divide-by-zero by adding validation checks when DAMON modules
attempt to apply the parameters.


This patch (of 2):

During the calculation of 'hot_thres' and 'cold_thres', either
'sample_interval' or 'aggr_interval' is used as the divisor, which may
lead to division-by-zero errors.  Fix it by directly returning -EINVAL
when such a case occurs.  Additionally, since 'aggr_interval' is already
required to be set no smaller than 'sample_interval' in damon_set_attrs(),
only the case where 'sample_interval' is zero needs to be checked.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 74e391f7da7d9d5235a3cca88ee9fc18f720c75b
Version 40e983cca9274e177bd5b9379299b44d9536ac68
Status affected
Version < 7bb675c9f0257840d33e5d1337d7e3afdd74a6bf
Version 40e983cca9274e177bd5b9379299b44d9536ac68
Status affected
Version < af0ae62b935317bed1a1361c8c9579db9d300e70
Version 40e983cca9274e177bd5b9379299b44d9536ac68
Status affected
Version < 326a4b3750c71af3f3c52399ec4dbe33b6da4c26
Version 40e983cca9274e177bd5b9379299b44d9536ac68
Status affected
Version < 711f19dfd783ffb37ca4324388b9c4cb87e71363
Version 40e983cca9274e177bd5b9379299b44d9536ac68
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.0
Status affected
Version < 6.0
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.153
Status unaffected
Version <= 6.6.*
Version 6.6.107
Status unaffected
Version <= 6.12.*
Version 6.12.48
Status unaffected
Version <= 6.16.*
Version 6.16.8
Status unaffected
Version <= *
Version 6.17
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.05
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string