๐Ÿ” CVE Alert

CVE-2025-38364

UNKNOWN 0.0

maple_tree: fix MA_STATE_PREALLOC flag in mas_preallocate()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: maple_tree: fix MA_STATE_PREALLOC flag in mas_preallocate() Temporarily clear the preallocation flag when explicitly requesting allocations. Pre-existing allocations are already counted against the request through mas_node_count_gfp(), but the allocations will not happen if the MA_STATE_PREALLOC flag is set. This flag is meant to avoid re-allocating in bulk allocation mode, and to detect issues with preallocation calculations. The MA_STATE_PREALLOC flag should also always be set on zero allocations so that detection of underflow allocations will print a WARN_ON() during consumption. User visible effect of this flaw is a WARN_ON() followed by a null pointer dereference when subsequent requests for larger number of nodes is ignored, such as the vma merge retry in mmap_region() caused by drivers altering the vma flags (which happens in v6.6, at least)

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 25, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
54a611b605901c7d5d05b6b8f5d04a6ceb0962aa < d69cd64bd5af41c6fd409313504089970edaf02f 54a611b605901c7d5d05b6b8f5d04a6ceb0962aa < e63032e66bca1d06e600033f3369ba3db3af0870 54a611b605901c7d5d05b6b8f5d04a6ceb0962aa < cf95f8426f889949b738f51ffcd72884411f3a6a 54a611b605901c7d5d05b6b8f5d04a6ceb0962aa < 9e32f4700867abbd5d19abfcf698dbd0d2ce36a4 54a611b605901c7d5d05b6b8f5d04a6ceb0962aa < fba46a5d83ca8decb338722fb4899026d8d9ead2
Linux / Linux
6.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d69cd64bd5af41c6fd409313504089970edaf02f git.kernel.org: https://git.kernel.org/stable/c/e63032e66bca1d06e600033f3369ba3db3af0870 git.kernel.org: https://git.kernel.org/stable/c/cf95f8426f889949b738f51ffcd72884411f3a6a git.kernel.org: https://git.kernel.org/stable/c/9e32f4700867abbd5d19abfcf698dbd0d2ce36a4 git.kernel.org: https://git.kernel.org/stable/c/fba46a5d83ca8decb338722fb4899026d8d9ead2 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html