{"id":"CVE-2025-38195","summary":"LoongArch: Fix panic caused by NULL-PMD in huge_pte_offset()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Fix panic caused by NULL-PMD in huge_pte_offset()\n\nERROR INFO:\n\nCPU 25 Unable to handle kernel paging request at virtual address 0x0\n         ...\n Call Trace:\n [\u003c900000000023c30c\u003e] huge_pte_offset+0x3c/0x58\n [\u003c900000000057fd4c\u003e] hugetlb_follow_page_mask+0x74/0x438\n [\u003c900000000051fee8\u003e] __get_user_pages+0xe0/0x4c8\n [\u003c9000000000522414\u003e] faultin_page_range+0x84/0x380\n [\u003c9000000000564e8c\u003e] madvise_vma_behavior+0x534/0xa48\n [\u003c900000000056689c\u003e] do_madvise+0x1bc/0x3e8\n [\u003c9000000000566df4\u003e] sys_madvise+0x24/0x38\n [\u003c90000000015b9e88\u003e] do_syscall+0x78/0x98\n [\u003c9000000000221f18\u003e] handle_syscall+0xb8/0x158\n\nIn some cases, pmd may be NULL and rely on NULL as the return value for\nprocessing, so it is necessary to determine this situation here.","modified":"2026-04-16T04:41:50.467439479Z","published":"2025-07-04T13:37:18.558Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38195.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/985f086f281b7bbb6644851e63af1a17ffff9277"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b427d98d55217b53c88643579fbbd8a4c351a105"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b5c7397b7fd125203c60b59860c168ee92291272"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ee084fa96123ede8b0563a1b5a9b23adc43cd50d"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38195.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38195"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2ca9380b12711afe95b3589bd82b59623b3c96b3"},{"fixed":"b427d98d55217b53c88643579fbbd8a4c351a105"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"51424fd171cee6a33f01f7c66b8eb23ac42289d4"},{"fixed":"985f086f281b7bbb6644851e63af1a17ffff9277"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"bd51834d1cf65a2c801295d230c220aeebf87a73"},{"fixed":"b5c7397b7fd125203c60b59860c168ee92291272"},{"fixed":"ee084fa96123ede8b0563a1b5a9b23adc43cd50d"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"34256805720993e37adf6127371a1265aea8376a"},{"last_affected":"b49f085cd671addbda4802d6b9382513f7dd0f30"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38195.json"}}],"schema_version":"1.7.5"}