CVE-2025-37818
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
08/05/2025
Last modified:
12/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
LoongArch: Return NULL from huge_pte_offset() for invalid PMD<br />
<br />
LoongArch&#39;s huge_pte_offset() currently returns a pointer to a PMD slot<br />
even if the underlying entry points to invalid_pte_table (indicating no<br />
mapping). Callers like smaps_hugetlb_range() fetch this invalid entry<br />
value (the address of invalid_pte_table) via this pointer.<br />
<br />
The generic is_swap_pte() check then incorrectly identifies this address<br />
as a swap entry on LoongArch, because it satisfies the "!pte_present()<br />
&& !pte_none()" conditions. This misinterpretation, combined with a<br />
coincidental match by is_migration_entry() on the address bits, leads to<br />
kernel crashes in pfn_swap_entry_to_page().<br />
<br />
Fix this at the architecture level by modifying huge_pte_offset() to<br />
check the PMD entry&#39;s content using pmd_none() before returning. If the<br />
entry is invalid (i.e., it points to invalid_pte_table), return NULL<br />
instead of the pointer to the slot.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.19 (including) | 6.1.136 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.89 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.26 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2ca9380b12711afe95b3589bd82b59623b3c96b3
- https://git.kernel.org/stable/c/34256805720993e37adf6127371a1265aea8376a
- https://git.kernel.org/stable/c/51424fd171cee6a33f01f7c66b8eb23ac42289d4
- https://git.kernel.org/stable/c/b49f085cd671addbda4802d6b9382513f7dd0f30
- https://git.kernel.org/stable/c/bd51834d1cf65a2c801295d230c220aeebf87a73
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



