CVE-2025-39756

EUVD-2025-28956
In the Linux kernel, the following vulnerability has been resolved:

fs: Prevent file descriptor table allocations exceeding INT_MAX

When sysctl_nr_open is set to a very high value (for example, 1073741816
as set by systemd), processes attempting to use file descriptors near
the limit can trigger massive memory allocation attempts that exceed
INT_MAX, resulting in a WARNING in mm/slub.c:

  WARNING: CPU: 0 PID: 44 at mm/slub.c:5027 __kvmalloc_node_noprof+0x21a/0x288

This happens because kvmalloc_array() and kvmalloc() check if the
requested size exceeds INT_MAX and emit a warning when the allocation is
not flagged with __GFP_NOWARN.

Specifically, when nr_open is set to 1073741816 (0x3ffffff8) and a
process calls dup2(oldfd, 1073741880), the kernel attempts to allocate:
- File descriptor array: 1073741880 * 8 bytes = 8,589,935,040 bytes
- Multiple bitmaps: ~400MB
- Total allocation size: > 8GB (exceeding INT_MAX = 2,147,483,647)

Reproducer:
1. Set /proc/sys/fs/nr_open to 1073741816:
   # echo 1073741816 > /proc/sys/fs/nr_open

2. Run a program that uses a high file descriptor:
   #include <unistd.h>
   #include <sys/resource.h>

   int main() {
       struct rlimit rlim = {1073741824, 1073741824};
       setrlimit(RLIMIT_NOFILE, &rlim);
       dup2(2, 1073741880);  // Triggers the warning
       return 0;
   }

3. Observe WARNING in dmesg at mm/slub.c:5027

systemd commit a8b627a introduced automatic bumping of fs.nr_open to the
maximum possible value. The rationale was that systems with memory
control groups (memcg) no longer need separate file descriptor limits
since memory is properly accounted. However, this change overlooked
that:

1. The kernel's allocation functions still enforce INT_MAX as a maximum
   size regardless of memcg accounting
2. Programs and tests that legitimately test file descriptor limits can
   inadvertently trigger massive allocations
3. The resulting allocations (>8GB) are impractical and will always fail

systemd's algorithm starts with INT_MAX and keeps halving the value
until the kernel accepts it. On most systems, this results in nr_open
being set to 1073741816 (0x3ffffff8), which is just under 1GB of file
descriptors.

While processes rarely use file descriptors near this limit in normal
operation, certain selftests (like
tools/testing/selftests/core/unshare_test.c) and programs that test file
descriptor limits can trigger this issue.

Fix this by adding a check in alloc_fdtable() to ensure the requested
allocation size does not exceed INT_MAX. This causes the operation to
fail with -EMFILE instead of triggering a kernel warning and avoids the
impractical >8GB memory allocation request.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
siemens-SADPADP
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 8%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
2.6.25 ≤
𝑥
< 5.4.297
linuxlinux_kernel
5.5 ≤
𝑥
< 5.10.241
linuxlinux_kernel
5.11 ≤
𝑥
< 5.15.190
linuxlinux_kernel
5.16 ≤
𝑥
< 6.1.149
linuxlinux_kernel
6.2 ≤
𝑥
< 6.6.103
linuxlinux_kernel
6.7 ≤
𝑥
< 6.12.43
linuxlinux_kernel
6.13 ≤
𝑥
< 6.15.11
linuxlinux_kernel
6.16 ≤
𝑥
< 6.16.2
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
SiemensSIMATIC CN 4100
𝑥
< V5.0
ADP
SiemensSIMATIC S7-1500 CPU 1518-4 PN\/DP MFP
V3.1.5 ≤
𝑥
< *
ADP
SiemensSIMATIC S7-1500 CPU 1518-4 PN\/DP MFP
V3.1.5 ≤
𝑥
< *
ADP
SiemensSIMATIC S7-1500 CPU 1518F-4 PN\/DP MFP
V3.1.5 ≤
𝑥
< *
ADP
SiemensSIMATIC S7-1500 CPU 1518F-4 PN\/DP MFP
V3.1.5 ≤
𝑥
< *
ADP
SiemensSIPLUS S7-1500 CPU 1518-4 PN\/DP MFP
V3.1.5 ≤
𝑥
< *
ADP
siemenssimatic_cn_4100
𝑥
< 5.0
ADP
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
6.1.170-3
fixed
bookworm (security)
6.1.172-1
fixed
bullseye
vulnerable
bullseye (security)
5.10.251-5
fixed
forky
7.0.7-1
fixed
sid
7.0.7-1
fixed
trixie
6.12.86-1
fixed
trixie (security)
6.12.88-1
fixed
linux-6.1
bullseye (security)
6.1.172-1~deb11u1
fixed
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
cluster-md-kmp-default
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
dlm-kmp-default
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
gfs2-kmp-default
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
kernel-64kb
suse enterprise desktop 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.22.1
fixed
kernel-azure
suse enterprise sap 15 SP6
6.4.0-150600.8.55.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.20.18.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.8.55.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.18.1
fixed
kernel-default
suse enterprise desktop 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.22.1
fixed
kernel-default-base
suse enterprise desktop 15 SP6
6.4.0-150600.23.78.1.150600.12.34.2
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.22.1.150700.17.15.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.78.1.150600.12.34.2
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.22.1.150700.17.15.1
fixed
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.78.1.150600.12.34.2
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.22.1.150700.17.15.1
fixed
kernel-default-man
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
kernel-docs
suse enterprise desktop 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.22.1
fixed
kernel-macros
suse enterprise desktop 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.22.1
fixed
kernel-obs-build
suse enterprise desktop 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.22.1
fixed
kernel-source
suse enterprise desktop 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.22.1
fixed
kernel-source-azure
suse enterprise sap 15 SP6
6.4.0-150600.8.55.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.20.18.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.8.55.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.18.1
fixed
kernel-syms
suse enterprise desktop 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.22.1
fixed
kernel-syms-azure
suse enterprise sap 15 SP6
6.4.0-150600.8.55.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.20.18.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.8.55.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.18.1
fixed
kernel-zfcpdump
suse enterprise desktop 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.22.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.78.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.22.1
fixed
ocfs2-kmp-default
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed