
Cloud Vulnerability DB
A community-led vulnerabilities database
A race condition vulnerability was discovered in the Linux kernel's memory management subsystem, specifically in the smapshugetlbrange functionality. The vulnerability (CVE-2025-39754) was disclosed on September 11, 2025, affecting the Linux kernel's handling of huge page table entries during memory migration (NVD, Ubuntu).
The vulnerability occurs when smapshugetlbrange() handles the page table entry (pte) without holding the proper page table lock (ptl), creating a race condition with memory migration operations. The race condition sequence involves interactions between smapshugetlbrange, migratepages, hugeptepget, removemigrationptes, foliounlock, and pfnswapentryfolio functions, ultimately leading to a BUGON condition in pfnswapentrytopage() (NVD).
The vulnerability affects multiple Linux distributions and their various kernel versions, including Ubuntu 22.04 LTS, 24.04 LTS, and 25.04, potentially impacting system stability and reliability. The issue is particularly concerning for systems utilizing huge pages in their memory management (Ubuntu).
The fix involves modifying smapshugetlbrange() to properly hold the page table lock (ptl) during its operation. System administrators are advised to update their Linux kernel to versions containing the fix (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."