
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's DAMON (Data Access MONitor) module was discovered and assigned CVE-2025-39909. The issue was disclosed on October 1, 2025, affecting the LRU_SORT and RECLAIM components of DAMON. The vulnerability exists in the parameter validation process during the application of user-configured settings (NVD, Ubuntu).
The vulnerability stems from insufficient validation of user-configured parameters in DAMON's RECLAIM and LRUSORT modules. Specifically, during the calculation of 'hotthres' and 'coldthres' values, either 'sampleinterval' or 'aggrinterval' is used as a divisor without proper validation, which can lead to division-by-zero errors. While 'aggrinterval' is required to be no smaller than 'sampleinterval' in damonsetattrs(), the case where 'sampleinterval' is zero remains unchecked (NVD).
The vulnerability can result in division-by-zero errors in the Linux kernel's memory management subsystem, potentially affecting system stability and performance (NVD).
The fix involves adding validation checks when DAMON modules attempt to apply parameters. The patch directly returns -EINVAL when a potential division-by-zero case is detected. The fix has been implemented in the Linux kernel, focusing specifically on the validation of 'sample_interval' values (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."