CVE-2025-71295
fs/buffer: add alert in try_to_free_buffers() for folios without buffers
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: fs/buffer: add alert in try_to_free_buffers() for folios without buffers try_to_free_buffers() can be called on folios with no buffers attached
when filemap_release_folio() is invoked on a folio belonging to a mapping
with AS_RELEASE_ALWAYS set but no release_folio operation defined. In such cases, folio_needs_release() returns true because of the
AS_RELEASE_ALWAYS flag, but the folio has no private buffer data. This
causes try_to_free_buffers() to call drop_buffers() on a folio with no
buffers, leading to a null pointer dereference. Adding a check in try_to_free_buffers() to return early if the folio has no
buffers attached, with WARN_ON_ONCE() to alert about the misconfiguration.
This provides defensive hardening.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2026-05-06 CVE Reserved
- 2026-05-06 CVE Published
- 2026-05-12 CVE Updated
- 2026-05-13 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (8)
| URL | Tag | Source |
|---|---|---|
| https://git.kernel.org/stable/c/d0eafc763135508be118dac208887a26c0adb74d | Vuln. Introduced | |
| https://git.kernel.org/stable/c/b4fa966f03b7401ceacd4ffd7227197afb2b8376 | Vuln. Introduced |
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|
Affected Vendors, Products, and Versions
| Vendor | Product | Version | Other | Status | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.1.72 < 6.1.165 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.1.72 < 6.1.165" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.6 < 6.6.128 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.6 < 6.6.128" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.6 < 6.12.75 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.6 < 6.12.75" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.6 < 6.18.16 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.6 < 6.18.16" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.6 < 6.19.6 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.6 < 6.19.6" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.6 < 7.0 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.6 < 7.0" | en |
Affected
| ||||||
