CVE-2025-39992

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-39992
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39992.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39992
Downstream
Published
2025-10-15T07:58:17.927Z
Modified
2025-11-28T02:35:19.114651Z
Summary
mm: swap: check for stable address space before operating on the VMA
Details

In the Linux kernel, the following vulnerability has been resolved:

mm: swap: check for stable address space before operating on the VMA

It is possible to hit a zero entry while traversing the vmas in unuse_mm() called from swapoff path and accessing it causes the OOPS:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000446--> Loading the memory from offset 0x40 on the XAZEROENTRY as address. Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault

The issue is manifested from the below race between the fork() on a process and swapoff: fork(dupmmap()) swapoff(unusemm) --------------- ----------------- 1) Identical mtree is built using _mtdup().

2) copypterange()--> copynonpresentpte(): The dst mm is added into the mmlist to be visible to the swapoff operation.

3) Fatal signal is sent to the parent process(which is the current during the fork) thus skip the duplication of the vmas and mark the vma range with XAZEROENTRY as a marker for this process that helps during exit_mmap().

                 4) swapoff is tried on the
                'mm' added to the 'mmlist' as
                part of the 2.

                 5) unuse_mm(), that iterates
                through the vma's of this 'mm'
                will hit the non-NULL zero entry
                and operating on this zero entry
                as a vma is resulting into the
                oops.

The proper fix would be around not exposing this partially-valid tree to others when droping the mmap lock, which is being solved with [1]. A simpler solution would be checking for MMFUNSTABLE, as it is set if mmstruct is not fully initialized in dup_mmap().

Thanks to Liam/Lorenzo/David for all the suggestions in fixing this issue.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39992.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d2406291483775ecddaee929231a39c70c08fda2
Fixed
4e5f060d7347466f77aaff1c0d5a6c4f1fb217ac
Fixed
9cddad3b26dac830407d2d3c0de5205ff6d6dda0
Fixed
e4e99d69b8b8295c501b2eef89e13306b738b667
Fixed
1367da7eb875d01102d2ed18654b24d261ff5393

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.8.0
Fixed
6.12.51
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.16.11
Type
ECOSYSTEM
Events
Introduced
6.17.0
Fixed
6.17.1