DEBIAN-CVE-2025-39700

Source
https://security-tracker.debian.org/tracker/CVE-2025-39700
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-39700.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-39700
Upstream
Published
2025-09-05T18:15:47Z
Modified
2025-09-30T05:20:34.857417Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: mm/damon/ops-common: ignore migration request to invalid nodes damonmigratepages() tries migration even if the target node is invalid. If users mistakenly make such invalid requests via DAMOSMIGRATE{HOT,COLD} action, the below kernel BUG can happen. [ 7831.883495] BUG: unable to handle page fault for address: 0000000000001f48 [ 7831.884160] #PF: supervisor read access in kernel mode [ 7831.884681] #PF: errorcode(0x0000) - not-present page [ 7831.885203] PGD 0 P4D 0 [ 7831.885468] Oops: Oops: 0000 [#1] SMP PTI [ 7831.885852] CPU: 31 UID: 0 PID: 94202 Comm: kdamond.0 Not tainted 6.16.0-rc5-mm-new-damon+ #93 PREEMPT(voluntary) [ 7831.886913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-4.el9 04/01/2014 [ 7831.887777] RIP: 0010:allocfrozenpagesnoprof (include/linux/mmzone.h:1724 include/linux/mmzone.h:1750 mm/pagealloc.c:4936 mm/pagealloc.c:5137) [...] [ 7831.895953] Call Trace: [ 7831.896195] <TASK> [ 7831.896397] _folioallocnoprof (mm/pagealloc.c:5183 mm/pagealloc.c:5192) [ 7831.896787] migratepagesbatch (mm/migrate.c:1189 mm/migrate.c:1851) [ 7831.897228] ? _pfxallocmigrationtarget (mm/migrate.c:2137) [ 7831.897735] migratepages (mm/migrate.c:2078) [ 7831.898141] ? _pfxallocmigrationtarget (mm/migrate.c:2137) [ 7831.898664] damonmigratefoliolist (mm/damon/ops-common.c:321 mm/damon/ops-common.c:354) [ 7831.899140] damonmigratepages (mm/damon/ops-common.c:405) [...] Add a target node validity check in damonmigratepages(). The validity check is stolen from that of dopagesmove(), which is being used for the movepages() system call.

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.48-1

Affected versions

6.*

6.12.38-1
6.12.41-1
6.12.43-1~bpo12+1
6.12.43-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.16.5-1

Affected versions

6.*

6.12.38-1
6.12.41-1
6.12.43-1~bpo12+1
6.12.43-1
6.12.48-1
6.13~rc6-1~exp1
6.13~rc7-1~exp1
6.13.2-1~exp1
6.13.3-1~exp1
6.13.4-1~exp1
6.13.5-1~exp1
6.13.6-1~exp1
6.13.7-1~exp1
6.13.8-1~exp1
6.13.9-1~exp1
6.13.10-1~exp1
6.13.11-1~exp1
6.14.3-1~exp1
6.14.5-1~exp1
6.14.6-1~exp1
6.15~rc7-1~exp1
6.15-1~exp1
6.15.1-1~exp1
6.15.2-1~exp1
6.15.3-1~exp1
6.15.4-1~exp1
6.15.5-1~exp1
6.15.6-1~exp1
6.16~rc7-1~exp1
6.16-1~exp1
6.16.1-1~exp1
6.16.3-1~bpo13+1
6.16.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}