CVE-2025-39909

Source
https://cve.org/CVERecord?id=CVE-2025-39909
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39909.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39909
Downstream
Related
Published
2025-10-01T07:44:32.936Z
Modified
2026-03-20T12:43:05.951373Z
Summary
mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()
Details

In the Linux kernel, the following vulnerability has been resolved:

mm/damon/lrusort: avoid divide-by-zero in damonlrusortapply_parameters()

Patch series "mm/damon: avoid divide-by-zero in DAMON module's parameters application".

DAMON's RECLAIM and LRU_SORT modules perform no validation on user-configured parameters during application, which may lead to division-by-zero errors.

Avoid the divide-by-zero by adding validation checks when DAMON modules attempt to apply the parameters.

This patch (of 2):

During the calculation of 'hotthres' and 'coldthres', either 'sampleinterval' or 'aggrinterval' is used as the divisor, which may lead to division-by-zero errors. Fix it by directly returning -EINVAL when such a case occurs. Additionally, since 'aggrinterval' is already required to be set no smaller than 'sampleinterval' in damonsetattrs(), only the case where 'sample_interval' is zero needs to be checked.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39909.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
40e983cca9274e177bd5b9379299b44d9536ac68
Fixed
74e391f7da7d9d5235a3cca88ee9fc18f720c75b
Fixed
7bb675c9f0257840d33e5d1337d7e3afdd74a6bf
Fixed
af0ae62b935317bed1a1361c8c9579db9d300e70
Fixed
326a4b3750c71af3f3c52399ec4dbe33b6da4c26
Fixed
711f19dfd783ffb37ca4324388b9c4cb87e71363

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39909.json"