CVE-2025-38447
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
25/07/2025
Last modified:
19/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/rmap: fix potential out-of-bounds page table access during batched unmap<br />
<br />
As pointed out by David[1], the batched unmap logic in<br />
try_to_unmap_one() may read past the end of a PTE table when a large<br />
folio&#39;s PTE mappings are not fully contained within a single page<br />
table.<br />
<br />
While this scenario might be rare, an issue triggerable from userspace<br />
must be fixed regardless of its likelihood. This patch fixes the<br />
out-of-bounds access by refactoring the logic into a new helper,<br />
folio_unmap_pte_batch().<br />
<br />
The new helper correctly calculates the safe batch size by capping the<br />
scan at both the VMA and PMD boundaries. To simplify the code, it also<br />
supports partial batching (i.e., any number of pages from 1 up to the<br />
calculated safe maximum), as there is no strong reason to special-case<br />
for fully mapped folios.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.15 (including) | 6.15.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



