In the Linux kernel, the following vulnerability has been resolved:
mm/damon/ops-common: ignore migration request to invalid nodes
damonmigratepages() tries migration even if the target node is invalid. If users mistakenly make such invalid requests via DAMOSMIGRATE{HOT,COLD} action, the below kernel BUG can happen.
[ 7831.883495] BUG: unable to handle page fault for address: 0000000000001f48
[ 7831.884160] #PF: supervisor read access in kernel mode
[ 7831.884681] #PF: error_code(0x0000) - not-present page
[ 7831.885203] PGD 0 P4D 0
[ 7831.885468] Oops: Oops: 0000 [#1] SMP PTI
[ 7831.885852] CPU: 31 UID: 0 PID: 94202 Comm: kdamond.0 Not tainted 6.16.0-rc5-mm-new-damon+ #93 PREEMPT(voluntary)
[ 7831.886913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-4.el9 04/01/2014
[ 7831.887777] RIP: 0010:__alloc_frozen_pages_noprof (include/linux/mmzone.h:1724 include/linux/mmzone.h:1750 mm/page_alloc.c:4936 mm/page_alloc.c:5137)
[...]
[ 7831.895953] Call Trace:
[ 7831.896195] <TASK>
[ 7831.896397] __folio_alloc_noprof (mm/page_alloc.c:5183 mm/page_alloc.c:5192)
[ 7831.896787] migrate_pages_batch (mm/migrate.c:1189 mm/migrate.c:1851)
[ 7831.897228] ? __pfx_alloc_migration_target (mm/migrate.c:2137)
[ 7831.897735] migrate_pages (mm/migrate.c:2078)
[ 7831.898141] ? __pfx_alloc_migration_target (mm/migrate.c:2137)
[ 7831.898664] damon_migrate_folio_list (mm/damon/ops-common.c:321 mm/damon/ops-common.c:354)
[ 7831.899140] damon_migrate_pages (mm/damon/ops-common.c:405)
[...]
Add a target node validity check in damonmigratepages(). The validity check is stolen from that of dopagesmove(), which is being used for the move_pages() system call.
[ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e6c3130690a01076efdf45aa02ba5d5c16849a0", "target": { "function": "damon_migrate_pages", "file": "mm/damon/ops-common.c" }, "id": "CVE-2025-39700-10239486", "deprecated": false, "signature_type": "Function", "signature_version": "v1", "digest": { "function_hash": "47421370731528859820207507568210861607", "length": 623.0 } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e6c3130690a01076efdf45aa02ba5d5c16849a0", "target": { "file": "mm/damon/ops-common.c" }, "id": "CVE-2025-39700-466bcd96", "deprecated": false, "signature_type": "Line", "signature_version": "v1", "digest": { "line_hashes": [ "190493640681743666083036201086725262267", "290497579978942777656434077989772811061", "44861907170254491866602334250634425580" ], "threshold": 0.9 } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7c303fa1f311aadc17fa82b7bbf776412adf45de", "target": { "file": "mm/damon/paddr.c" }, "id": "CVE-2025-39700-539fa19a", "deprecated": false, "signature_type": "Line", "signature_version": "v1", "digest": { "line_hashes": [ "190493640681743666083036201086725262267", "290497579978942777656434077989772811061", "44861907170254491866602334250634425580" ], "threshold": 0.9 } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7c303fa1f311aadc17fa82b7bbf776412adf45de", "target": { "function": "damon_pa_migrate_pages", "file": "mm/damon/paddr.c" }, "id": "CVE-2025-39700-f7ea2699", "deprecated": false, "signature_type": "Function", "signature_version": "v1", "digest": { "function_hash": "24999326068807940954896198761135025729", "length": 630.0 } } ]