CVE-2025-39909
📋 TL;DR
A divide-by-zero vulnerability in the Linux kernel's DAMON LRU_SORT module allows local attackers to trigger a kernel panic by setting certain parameters to zero. This affects systems running vulnerable Linux kernel versions with DAMON modules enabled. The vulnerability requires local access to configure DAMON parameters.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local denial of service causing kernel panic and system crash, potentially leading to data loss or service disruption.
Likely Case
Local denial of service causing system instability or crash when malicious users manipulate DAMON parameters.
If Mitigated
Minimal impact if DAMON modules are disabled or proper parameter validation is in place.
🎯 Exploit Status
Exploitation requires local access and ability to set DAMON parameters. No public exploits known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 326a4b3750c71af3f3c52399ec4dbe33b6da4c26, 711f19dfd783ffb37ca4324388b9c4cb87e71363, 74e391f7da7d9d5235a3cca88ee9fc18f720c75b, 7bb675c9f0257840d33e5d1337d7e3afdd74a6bf, af0ae62b935317bed1a1361c8c9579db9d300e70
Vendor Advisory: https://git.kernel.org/stable/c/326a4b3750c71af3f3c52399ec4dbe33b6da4c26
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.
🔧 Temporary Workarounds
Disable DAMON LRU_SORT module
linuxPrevent exploitation by disabling the vulnerable DAMON LRU_SORT module
echo 0 > /sys/kernel/mm/damon/lru_sort/enabled
Restrict DAMON parameter access
linuxLimit access to DAMON configuration files to prevent malicious parameter changes
chmod 600 /sys/kernel/mm/damon/lru_sort/*
chown root:root /sys/kernel/mm/damon/lru_sort/*
🧯 If You Can't Patch
- Disable DAMON LRU_SORT module via sysfs interface
- Implement strict access controls on /sys/kernel/mm/damon/lru_sort/ directory
🔍 How to Verify
Check if Vulnerable:
Check if DAMON LRU_SORT is enabled: cat /sys/kernel/mm/damon/lru_sort/enabled. If returns 1 and kernel version is unpatched, system is vulnerable.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits and test parameter validation by attempting to set sample_interval=0 (should return error).
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs mentioning divide error or DAMON
- System crash/reboot events without clear cause
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("divide error" OR "DAMON" OR "lru_sort")
🔗 References
- https://git.kernel.org/stable/c/326a4b3750c71af3f3c52399ec4dbe33b6da4c26
- https://git.kernel.org/stable/c/711f19dfd783ffb37ca4324388b9c4cb87e71363
- https://git.kernel.org/stable/c/74e391f7da7d9d5235a3cca88ee9fc18f720c75b
- https://git.kernel.org/stable/c/7bb675c9f0257840d33e5d1337d7e3afdd74a6bf
- https://git.kernel.org/stable/c/af0ae62b935317bed1a1361c8c9579db9d300e70
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html