In the Linux kernel, the following vulnerability has been resolved:
mm: swap: fix potential buffer overflow in setup_clusters()
In setup_swap_map(), we only ensure badpages are in range (0, last_page].
As maxpages might be < last_page, setup_clusters() will encounter a buffer
overflow when a badpage is >= maxpages.
Only call inc_cluster_info_page() for badpage which is < maxpages to fix
the issue.
References
Configurations
Configuration 1 (hide)
|
History
25 Nov 2025, 17:59
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-120 | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/152c1339dc13ad46f1b136e8693de15980750835 - Patch | |
| References | () https://git.kernel.org/stable/c/815c528b13f2bb9b3130c13bedeabf2351a68129 - Patch | |
| References | () https://git.kernel.org/stable/c/91b370800b3f2b3dda244c0ab06719c4971190a5 - Patch | |
| References | () https://git.kernel.org/stable/c/9b01ada580ee84fb319e7ecb5fb5b1f54a9eb799 - Patch |
07 Sep 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-07 16:15
Updated : 2025-11-25 17:59
NVD link : CVE-2025-39727
Mitre link : CVE-2025-39727
CVE.ORG link : CVE-2025-39727
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
