CVE-2025-71295
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
06/05/2026
Last modified:
12/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
fs/buffer: add alert in try_to_free_buffers() for folios without buffers<br />
<br />
try_to_free_buffers() can be called on folios with no buffers attached<br />
when filemap_release_folio() is invoked on a folio belonging to a mapping<br />
with AS_RELEASE_ALWAYS set but no release_folio operation defined.<br />
<br />
In such cases, folio_needs_release() returns true because of the<br />
AS_RELEASE_ALWAYS flag, but the folio has no private buffer data. This<br />
causes try_to_free_buffers() to call drop_buffers() on a folio with no<br />
buffers, leading to a null pointer dereference.<br />
<br />
Adding a check in try_to_free_buffers() to return early if the folio has no<br />
buffers attached, with WARN_ON_ONCE() to alert about the misconfiguration.<br />
This provides defensive hardening.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.72 (including) | 6.1.165 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.128 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.75 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1b111a69a6e33a922622bf9870e4e63fb2b649c8
- https://git.kernel.org/stable/c/42c32d7571ccd8ef32351cac506f00b0fae99fd2
- https://git.kernel.org/stable/c/727e5140e0cf83b4ce6a11b89bb73bff5d96f8f3
- https://git.kernel.org/stable/c/b68f91ef3b3fe82ad78c417de71b675699a8467c
- https://git.kernel.org/stable/c/c1b6227555c52781178132b7a06466711855795c
- https://git.kernel.org/stable/c/c6246ca15999053d2632fbcc7b86e6eef7f077cb



