CVE-2025-38195 (GCVE-0-2025-38195)
Vulnerability from cvelistv5
Published
2025-07-04 13:37
Modified
2025-07-28 04:14
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: LoongArch: Fix panic caused by NULL-PMD in huge_pte_offset() ERROR INFO: CPU 25 Unable to handle kernel paging request at virtual address 0x0 ... Call Trace: [<900000000023c30c>] huge_pte_offset+0x3c/0x58 [<900000000057fd4c>] hugetlb_follow_page_mask+0x74/0x438 [<900000000051fee8>] __get_user_pages+0xe0/0x4c8 [<9000000000522414>] faultin_page_range+0x84/0x380 [<9000000000564e8c>] madvise_vma_behavior+0x534/0xa48 [<900000000056689c>] do_madvise+0x1bc/0x3e8 [<9000000000566df4>] sys_madvise+0x24/0x38 [<90000000015b9e88>] do_syscall+0x78/0x98 [<9000000000221f18>] handle_syscall+0xb8/0x158 In some cases, pmd may be NULL and rely on NULL as the return value for processing, so it is necessary to determine this situation here.
Impacted products
Vendor Product Version
Linux Linux Version: 2ca9380b12711afe95b3589bd82b59623b3c96b3
Version: 51424fd171cee6a33f01f7c66b8eb23ac42289d4
Version: bd51834d1cf65a2c801295d230c220aeebf87a73
Version: bd51834d1cf65a2c801295d230c220aeebf87a73
Version: 34256805720993e37adf6127371a1265aea8376a
Version: b49f085cd671addbda4802d6b9382513f7dd0f30
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "arch/loongarch/mm/hugetlbpage.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "b427d98d55217b53c88643579fbbd8a4c351a105",
              "status": "affected",
              "version": "2ca9380b12711afe95b3589bd82b59623b3c96b3",
              "versionType": "git"
            },
            {
              "lessThan": "985f086f281b7bbb6644851e63af1a17ffff9277",
              "status": "affected",
              "version": "51424fd171cee6a33f01f7c66b8eb23ac42289d4",
              "versionType": "git"
            },
            {
              "lessThan": "b5c7397b7fd125203c60b59860c168ee92291272",
              "status": "affected",
              "version": "bd51834d1cf65a2c801295d230c220aeebf87a73",
              "versionType": "git"
            },
            {
              "lessThan": "ee084fa96123ede8b0563a1b5a9b23adc43cd50d",
              "status": "affected",
              "version": "bd51834d1cf65a2c801295d230c220aeebf87a73",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "34256805720993e37adf6127371a1265aea8376a",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "b49f085cd671addbda4802d6b9382513f7dd0f30",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "arch/loongarch/mm/hugetlbpage.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.15"
            },
            {
              "lessThan": "6.15",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.95",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.35",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.15.*",
              "status": "unaffected",
              "version": "6.15.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.16",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.95",
                  "versionStartIncluding": "6.6.89",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.35",
                  "versionStartIncluding": "6.12.26",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15.4",
                  "versionStartIncluding": "6.15",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.16",
                  "versionStartIncluding": "6.15",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.1.136",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.14.5",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Fix panic caused by NULL-PMD in huge_pte_offset()\n\nERROR INFO:\n\nCPU 25 Unable to handle kernel paging request at virtual address 0x0\n         ...\n Call Trace:\n [\u003c900000000023c30c\u003e] huge_pte_offset+0x3c/0x58\n [\u003c900000000057fd4c\u003e] hugetlb_follow_page_mask+0x74/0x438\n [\u003c900000000051fee8\u003e] __get_user_pages+0xe0/0x4c8\n [\u003c9000000000522414\u003e] faultin_page_range+0x84/0x380\n [\u003c9000000000564e8c\u003e] madvise_vma_behavior+0x534/0xa48\n [\u003c900000000056689c\u003e] do_madvise+0x1bc/0x3e8\n [\u003c9000000000566df4\u003e] sys_madvise+0x24/0x38\n [\u003c90000000015b9e88\u003e] do_syscall+0x78/0x98\n [\u003c9000000000221f18\u003e] handle_syscall+0xb8/0x158\n\nIn some cases, pmd may be NULL and rely on NULL as the return value for\nprocessing, so it is necessary to determine this situation here."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-28T04:14:48.432Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/b427d98d55217b53c88643579fbbd8a4c351a105"
        },
        {
          "url": "https://git.kernel.org/stable/c/985f086f281b7bbb6644851e63af1a17ffff9277"
        },
        {
          "url": "https://git.kernel.org/stable/c/b5c7397b7fd125203c60b59860c168ee92291272"
        },
        {
          "url": "https://git.kernel.org/stable/c/ee084fa96123ede8b0563a1b5a9b23adc43cd50d"
        }
      ],
      "title": "LoongArch: Fix panic caused by NULL-PMD in huge_pte_offset()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-38195",
    "datePublished": "2025-07-04T13:37:18.558Z",
    "dateReserved": "2025-04-16T04:51:23.993Z",
    "dateUpdated": "2025-07-28T04:14:48.432Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-38195\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-07-04T14:15:26.667\",\"lastModified\":\"2025-07-08T16:18:53.607\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nLoongArch: Fix panic caused by NULL-PMD in huge_pte_offset()\\n\\nERROR INFO:\\n\\nCPU 25 Unable to handle kernel paging request at virtual address 0x0\\n         ...\\n Call Trace:\\n [\u003c900000000023c30c\u003e] huge_pte_offset+0x3c/0x58\\n [\u003c900000000057fd4c\u003e] hugetlb_follow_page_mask+0x74/0x438\\n [\u003c900000000051fee8\u003e] __get_user_pages+0xe0/0x4c8\\n [\u003c9000000000522414\u003e] faultin_page_range+0x84/0x380\\n [\u003c9000000000564e8c\u003e] madvise_vma_behavior+0x534/0xa48\\n [\u003c900000000056689c\u003e] do_madvise+0x1bc/0x3e8\\n [\u003c9000000000566df4\u003e] sys_madvise+0x24/0x38\\n [\u003c90000000015b9e88\u003e] do_syscall+0x78/0x98\\n [\u003c9000000000221f18\u003e] handle_syscall+0xb8/0x158\\n\\nIn some cases, pmd may be NULL and rely on NULL as the return value for\\nprocessing, so it is necessary to determine this situation here.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: LoongArch: Se corrige el p\u00e1nico causado por NULL-PMD en huge_pte_offset() INFORMACI\u00d3N DE ERROR: CPU 25 No se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual 0x0 ... Seguimiento de llamadas:  [\u0026lt;900000000023c30c\u0026gt;] huge_pte_offset+0x3c/0x58 [\u0026lt;900000000057fd4c\u0026gt;] hugetlb_follow_page_mask+0x74/0x438 [\u0026lt;900000000051fee8\u0026gt;] __get_user_pages+0xe0/0x4c8 [\u0026lt;9000000000522414\u0026gt;] faultin_page_range+0x84/0x380 [\u0026lt;9000000000564e8c\u0026gt;] madvise_vma_behavior+0x534/0xa48 [\u0026lt;900000000056689c\u0026gt;] do_madvise+0x1bc/0x3e8 [\u0026lt;9000000000566df4\u0026gt;] sys_madvise+0x24/0x38 [\u0026lt;90000000015b9e88\u0026gt;] do_syscall+0x78/0x98 [\u0026lt;9000000000221f18\u0026gt;] handle_syscall+0xb8/0x158 En algunos casos, pmd puede ser NULL y depender de NULL como valor de retorno para el procesamiento, por lo que es necesario determinar esta situaci\u00f3n aqu\u00ed.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/985f086f281b7bbb6644851e63af1a17ffff9277\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b427d98d55217b53c88643579fbbd8a4c351a105\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b5c7397b7fd125203c60b59860c168ee92291272\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ee084fa96123ede8b0563a1b5a9b23adc43cd50d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…