-
CVE-2025-40006
- EPSS 0.05%
- Veröffentlicht 20.10.2025 15:26:53
- Zuletzt bearbeitet 21.10.2025 19:31:25
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix folio is still mapped when deleted Migration may be raced with fallocating hole. remove_inode_single_folio will unmap the folio if the folio is still mapped. However, it's called without folio lock. If the folio is migrated and the mapped pte has been converted to migration entry, folio_mapped() returns false, and won't unmap it. Due to extra refcount held by remove_inode_single_folio, migration fails, restores migration entry to normal pte, and the folio is mapped again. As a result, we triggered BUG in filemap_unaccount_folio. The log is as follows: BUG: Bad page cache in process hugetlb pfn:156c00 page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00 head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0 aops:hugetlbfs_aops ino:dcc dentry name(?):"my_hugepage_file" flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff) page_type: f4(hugetlb) page dumped because: still mapped when deleted CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 Call Trace: <TASK> dump_stack_lvl+0x4f/0x70 filemap_unaccount_folio+0xc4/0x1c0 __filemap_remove_folio+0x38/0x1c0 filemap_remove_folio+0x41/0xd0 remove_inode_hugepages+0x142/0x250 hugetlbfs_fallocate+0x471/0x5a0 vfs_fallocate+0x149/0x380 Hold folio lock before checking if the folio is mapped to avold race with migration.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
bc1c9ce8aeff45318332035dbef9713fb9e982d7
Version
4aae8d1c051ea00b456da6811bc36d1f69de5445
Status
affected
Version <
91f548e920fbf8be3f285bfa3fa045ae017e836d
Version
4aae8d1c051ea00b456da6811bc36d1f69de5445
Status
affected
Version <
3e851448078f5b01f6264915df3cfef75e323a12
Version
4aae8d1c051ea00b456da6811bc36d1f69de5445
Status
affected
Version <
c1dc0524ab2cc3982d4e0d2bfac71a0cd4d65c39
Version
4aae8d1c051ea00b456da6811bc36d1f69de5445
Status
affected
Version <
c9c2a51f91aea70e89b496cac360cd795a2b3c26
Version
4aae8d1c051ea00b456da6811bc36d1f69de5445
Status
affected
Version <
910d7749346c4b0acdc6e4adfdc4a9984281a206
Version
4aae8d1c051ea00b456da6811bc36d1f69de5445
Status
affected
Version <
21ee79ce938127f88fe07e409c1817f477dbe7ea
Version
4aae8d1c051ea00b456da6811bc36d1f69de5445
Status
affected
Version <
7b7387650dcf2881fd8bb55bcf3c8bd6c9542dd7
Version
4aae8d1c051ea00b456da6811bc36d1f69de5445
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.5
Status
affected
Version <
4.5
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.300
Status
unaffected
Version <=
5.10.*
Version
5.10.245
Status
unaffected
Version <=
5.15.*
Version
5.15.194
Status
unaffected
Version <=
6.1.*
Version
6.1.155
Status
unaffected
Version <=
6.6.*
Version
6.6.109
Status
unaffected
Version <=
6.12.*
Version
6.12.50
Status
unaffected
Version <=
6.16.*
Version
6.16.10
Status
unaffected
Version <=
*
Version
6.17
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.158 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|