In the Linux kernel, the following vulnerability has been resolved:
mm: swap: fix potential buffer overflow in setup_clusters()
In setup_swap_map(), we only ensure badpages are in range (0, last_page].
As maxpages might be < last_page, setup_clusters() will encounter a buffer
overflow when a badpage is >= maxpages.
Only call inc_cluster_info_page() for badpage which is < maxpages to fix
the issue.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-09-07 16:15
Updated : 2025-11-25 17:59
NVD link : CVE-2025-39727
Mitre link : CVE-2025-39727
CVE.ORG link : CVE-2025-39727
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
