CVE-2025-38195

In the Linux kernel, the following vulnerability has been resolved: LoongArch: Fix panic caused by NULL-PMD in huge_pte_offset() ERROR INFO: CPU 25 Unable to handle kernel paging request at virtual address 0x0 ... Call Trace: [<900000000023c30c>] huge_pte_offset+0x3c/0x58 [<900000000057fd4c>] hugetlb_follow_page_mask+0x74/0x438 [<900000000051fee8>] __get_user_pages+0xe0/0x4c8 [<9000000000522414>] faultin_page_range+0x84/0x380 [<9000000000564e8c>] madvise_vma_behavior+0x534/0xa48 [<900000000056689c>] do_madvise+0x1bc/0x3e8 [<9000000000566df4>] sys_madvise+0x24/0x38 [<90000000015b9e88>] do_syscall+0x78/0x98 [<9000000000221f18>] handle_syscall+0xb8/0x158 In some cases, pmd may be NULL and rely on NULL as the return value for processing, so it is necessary to determine this situation here.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc7:*:*:*:*:*:*

History

19 Nov 2025, 20:46

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/985f086f281b7bbb6644851e63af1a17ffff9277 - () https://git.kernel.org/stable/c/985f086f281b7bbb6644851e63af1a17ffff9277 - Patch
References () https://git.kernel.org/stable/c/b427d98d55217b53c88643579fbbd8a4c351a105 - () https://git.kernel.org/stable/c/b427d98d55217b53c88643579fbbd8a4c351a105 - Patch
References () https://git.kernel.org/stable/c/b5c7397b7fd125203c60b59860c168ee92291272 - () https://git.kernel.org/stable/c/b5c7397b7fd125203c60b59860c168ee92291272 - Patch
References () https://git.kernel.org/stable/c/ee084fa96123ede8b0563a1b5a9b23adc43cd50d - () https://git.kernel.org/stable/c/ee084fa96123ede8b0563a1b5a9b23adc43cd50d - Patch

08 Jul 2025, 16:18

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: LoongArch: Se corrige el pánico causado por NULL-PMD en huge_pte_offset() INFORMACIÓN DE ERROR: CPU 25 No se puede manejar la solicitud de paginación del kernel en la dirección virtual 0x0 ... Seguimiento de llamadas: [&lt;900000000023c30c&gt;] huge_pte_offset+0x3c/0x58 [&lt;900000000057fd4c&gt;] hugetlb_follow_page_mask+0x74/0x438 [&lt;900000000051fee8&gt;] __get_user_pages+0xe0/0x4c8 [&lt;9000000000522414&gt;] faultin_page_range+0x84/0x380 [&lt;9000000000564e8c&gt;] madvise_vma_behavior+0x534/0xa48 [&lt;900000000056689c&gt;] do_madvise+0x1bc/0x3e8 [&lt;9000000000566df4&gt;] sys_madvise+0x24/0x38 [&lt;90000000015b9e88&gt;] do_syscall+0x78/0x98 [&lt;9000000000221f18&gt;] handle_syscall+0xb8/0x158 En algunos casos, pmd puede ser NULL y depender de NULL como valor de retorno para el procesamiento, por lo que es necesario determinar esta situación aquí.

04 Jul 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-04 14:15

Updated : 2025-11-19 20:46


NVD link : CVE-2025-38195

Mitre link : CVE-2025-38195

CVE.ORG link : CVE-2025-38195


JSON object : View

Products Affected

linux

  • linux_kernel