Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix potential buffer overflow in setup_clusters() In setup_swap_map(), we only ensure badpages are in range (0, last_page]. As maxpages might be < last_page, setup_clusters() will encounter a buffer overflow when a badpage is >= maxpages. Only call inc_cluster_info_page() for badpage which is < maxpages to fix the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.12, < 6.12.42 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/152c1339dc13ad46f1b136e8693de15980750835Patch
- https://git.kernel.org/stable/c/815c528b13f2bb9b3130c13bedeabf2351a68129Patch
- https://git.kernel.org/stable/c/91b370800b3f2b3dda244c0ab06719c4971190a5Patch
- https://git.kernel.org/stable/c/9b01ada580ee84fb319e7ecb5fb5b1f54a9eb799Patch
FAQ
What is CVE-2025-39727?
CVE-2025-39727 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix potential buffer overflow in setup_clusters() In setup_swap_map(), we only ensure badpages are in range (0, last_pag...
How severe is CVE-2025-39727?
CVE-2025-39727 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-39727?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.