CVE-2025-22015
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
08/04/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/migrate: fix shmem xarray update during migration<br />
<br />
A shmem folio can be either in page cache or in swap cache, but not at the<br />
same time. Namely, once it is in swap cache, folio->mapping should be<br />
NULL, and the folio is no longer in a shmem mapping.<br />
<br />
In __folio_migrate_mapping(), to determine the number of xarray entries to<br />
update, folio_test_swapbacked() is used, but that conflates shmem in page<br />
cache case and shmem in swap cache case. It leads to xarray multi-index<br />
entry corruption, since it turns a sibling entry to a normal entry during<br />
xas_store() (see [1] for a userspace reproduction). Fix it by only using<br />
folio_test_swapcache() to determine whether xarray is storing swap cache<br />
entries or not to choose the right number of xarray entries to update.<br />
<br />
[1] https://lore.kernel.org/linux-mm/Z8idPCkaJW1IChjT@casper.infradead.org/<br />
<br />
Note:<br />
In __split_huge_page(), folio_test_anon() && folio_test_swapcache() is<br />
used to get swap_cache address space, but that ignores the shmem folio in<br />
swap cache case. It could lead to NULL pointer dereferencing when a<br />
in-swap-cache shmem folio is split at __xa_store(), since<br />
!folio_test_anon() is true and folio->mapping is NULL. But fortunately,<br />
its caller split_huge_page_to_list_to_order() bails out early with EBUSY<br />
when folio->mapping is NULL. So no need to take care of it here.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.71 (including) | 6.1.132 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.10 (including) | 6.6.85 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7.1 (including) | 6.12.21 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.7:rc8:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/29124ae980e2860f0eec7355949d3d3292ee81da
- https://git.kernel.org/stable/c/49100c0b070e900f87c8fac3be9b9ef8a30fa673
- https://git.kernel.org/stable/c/60cf233b585cdf1f3c5e52d1225606b86acd08b0
- https://git.kernel.org/stable/c/75cfb92eb63298d717b6b0118f91ba12c4fcfeb5
- https://git.kernel.org/stable/c/c057ee03f751d6cecf7ee64f52f6545d94082aaa
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



