๐Ÿ” CVE Alert

CVE-2025-38447

UNKNOWN 0.0

mm/rmap: fix potential out-of-bounds page table access during batched unmap

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: mm/rmap: fix potential out-of-bounds page table access during batched unmap As pointed out by David[1], the batched unmap logic in try_to_unmap_one() may read past the end of a PTE table when a large folio's PTE mappings are not fully contained within a single page table. While this scenario might be rare, an issue triggerable from userspace must be fixed regardless of its likelihood. This patch fixes the out-of-bounds access by refactoring the logic into a new helper, folio_unmap_pte_batch(). The new helper correctly calculates the safe batch size by capping the scan at both the VMA and PMD boundaries. To simplify the code, it also supports partial batching (i.e., any number of pages from 1 up to the calculated safe maximum), as there is no strong reason to special-case for fully mapped folios.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 25, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
354dffd29575cdf13154e8fb787322354aa9efc4 < 510fe9c15d07e765d96be9a9dc37e5057c6c09f4 354dffd29575cdf13154e8fb787322354aa9efc4 < ddd05742b45b083975a0855ef6ebbf88cf1f532a
Linux / Linux
6.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/510fe9c15d07e765d96be9a9dc37e5057c6c09f4 git.kernel.org: https://git.kernel.org/stable/c/ddd05742b45b083975a0855ef6ebbf88cf1f532a