Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2025-39725

Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-476 Desreferencia a puntero nulo (NULL)
Fecha de publicación:
05/09/2025
Última modificación:
25/11/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm/vmscan: fix hwpoisoned large folio handling in shrink_folio_list<br /> <br /> In shrink_folio_list(), the hwpoisoned folio may be large folio, which<br /> can&amp;#39;t be handled by unmap_poisoned_folio(). For THP, try_to_unmap_one()<br /> must be passed with TTU_SPLIT_HUGE_PMD to split huge PMD first and then<br /> retry. Without TTU_SPLIT_HUGE_PMD, we will trigger null-ptr deref of<br /> pvmw.pte. Even we passed TTU_SPLIT_HUGE_PMD, we will trigger a<br /> WARN_ON_ONCE due to the page isn&amp;#39;t in swapcache.<br /> <br /> Since UCE is rare in real world, and race with reclaimation is more rare,<br /> just skipping the hwpoisoned large folio is enough. memory_failure() will<br /> handle it if the UCE is triggered again.<br /> <br /> This happens when memory reclaim for large folio races with<br /> memory_failure(), and will lead to kernel panic. The race is as<br /> follows:<br /> <br /> cpu0 cpu1<br /> shrink_folio_list memory_failure<br /> TestSetPageHWPoison<br /> unmap_poisoned_folio<br /> --&gt; trigger BUG_ON due to<br /> unmap_poisoned_folio couldn&amp;#39;t<br /> handle large folio<br /> <br /> [tujinjiang@huawei.com: add comment to unmap_poisoned_folio()]

Productos y versiones vulnerables

CPE Desde Hasta
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.12.26 (incluyendo) 6.12.41 (excluyendo)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.14.5 (incluyendo) 6.15.9 (excluyendo)
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc7:*:*:*:*:*:*