CVE-2025-40006

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-40006
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40006.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-40006
Downstream
Related
Published
2025-10-20T15:26:53.097Z
Modified
2025-11-28T02:33:54.417603Z
Summary
mm/hugetlb: fix folio is still mapped when deleted
Details

In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix folio is still mapped when deleted

Migration may be raced with fallocating hole. removeinodesinglefolio will unmap the folio if the folio is still mapped. However, it's called without folio lock. If the folio is migrated and the mapped pte has been converted to migration entry, foliomapped() returns false, and won't unmap it. Due to extra refcount held by removeinodesinglefolio, migration fails, restores migration entry to normal pte, and the folio is mapped again. As a result, we triggered BUG in filemapunaccount_folio.

The log is as follows: BUG: Bad page cache in process hugetlb pfn:156c00 page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00 head: order:9 mapcount:1 entiremapcount:1 nrpagesmapped:0 pincount:0 aops:hugetlbfsaops ino:dcc dentry name(?):"myhugepagefile" flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff) pagetype: f4(hugetlb) page dumped because: still mapped when deleted CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 Call Trace: <TASK> dumpstacklvl+0x4f/0x70 filemapunaccountfolio+0xc4/0x1c0 _filemapremovefolio+0x38/0x1c0 filemapremovefolio+0x41/0xd0 removeinodehugepages+0x142/0x250 hugetlbfsfallocate+0x471/0x5a0 vfsfallocate+0x149/0x380

Hold folio lock before checking if the folio is mapped to avold race with migration.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40006.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4aae8d1c051ea00b456da6811bc36d1f69de5445
Fixed
bc1c9ce8aeff45318332035dbef9713fb9e982d7
Fixed
91f548e920fbf8be3f285bfa3fa045ae017e836d
Fixed
3e851448078f5b01f6264915df3cfef75e323a12
Fixed
c1dc0524ab2cc3982d4e0d2bfac71a0cd4d65c39
Fixed
c9c2a51f91aea70e89b496cac360cd795a2b3c26
Fixed
910d7749346c4b0acdc6e4adfdc4a9984281a206
Fixed
21ee79ce938127f88fe07e409c1817f477dbe7ea
Fixed
7b7387650dcf2881fd8bb55bcf3c8bd6c9542dd7

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.5.0
Fixed
5.4.300
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.245
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.194
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.155
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.109
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.50
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.16.10