CVE-2025-38364
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
25/07/2025
Last modified:
16/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
maple_tree: fix MA_STATE_PREALLOC flag in mas_preallocate()<br />
<br />
Temporarily clear the preallocation flag when explicitly requesting<br />
allocations. Pre-existing allocations are already counted against the<br />
request through mas_node_count_gfp(), but the allocations will not happen<br />
if the MA_STATE_PREALLOC flag is set. This flag is meant to avoid<br />
re-allocating in bulk allocation mode, and to detect issues with<br />
preallocation calculations.<br />
<br />
The MA_STATE_PREALLOC flag should also always be set on zero allocations<br />
so that detection of underflow allocations will print a WARN_ON() during<br />
consumption.<br />
<br />
User visible effect of this flaw is a WARN_ON() followed by a null pointer<br />
dereference when subsequent requests for larger number of nodes is<br />
ignored, such as the vma merge retry in mmap_region() caused by drivers<br />
altering the vma flags (which happens in v6.6, at least)
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1 (including) | 6.1.146 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.99 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.36 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/9e32f4700867abbd5d19abfcf698dbd0d2ce36a4
- https://git.kernel.org/stable/c/cf95f8426f889949b738f51ffcd72884411f3a6a
- https://git.kernel.org/stable/c/d69cd64bd5af41c6fd409313504089970edaf02f
- https://git.kernel.org/stable/c/e63032e66bca1d06e600033f3369ba3db3af0870
- https://git.kernel.org/stable/c/fba46a5d83ca8decb338722fb4899026d8d9ead2
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



