CVE-2024-50200
Linux Kernel vulnerability analysis and mitigation

Overview

A subtle maple tree corruption bug has been discovered in the Linux kernel that has existed since the inception of the algorithm. The vulnerability (CVE-2024-50200) became more prominent after the implementation of commit f8d112a4e657 ("mm/mmap: avoid zeroing vma tree in mmap_region()"). The bug occurs when attempting to perform a spanning store across two leaf nodes, where the right leaf node is the rightmost child of the shared parent, and the store completely consumes the right-mode node (Kernel Git).

Technical details

The vulnerability arises in the maswrspanningstore() function where it mistakenly duplicates new and existing entries at the maximum pivot within the range, leading to maple tree corruption. The issue occurs during the store operation when it attempts to overwrite overlapping ranges and adjust the tree. When a spanning store is required, the function stops at the parent node containing the target range, and maswrstoretype() marks the mas->storetype as wrspanning_store (Kernel Git).

Impact

The vulnerability results in maple tree corruption, which can lead to system instability. This was particularly observed after the release of kernel v6.12-rc1, where users encountered mm instability that was later identified as maple tree corruption through the use of CONFIGDEBUGVMMAPLETREE and similar configuration options (Kernel Git).

Mitigation and workarounds

A fix has been implemented that detects if the right hand node is populated by checking if the maximum value present exceeds the last, rather than basing this on offset position. The patch also updates comments and eliminates the unused bool return value in maswrwalk_index(). The fix has been tested and confirmed to resolve the issues by both Bert Karwatzki and Mikhail Gavrilov (Kernel Git).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40205HIGH7.8
  • Linux KernelLinux Kernel
  • linux-hwe-6.14
NoYesNov 12, 2025
CVE-2025-40211HIGH7.1
  • Linux KernelLinux Kernel
  • linux-azure-fde-6.14
NoYesNov 21, 2025
CVE-2025-40206MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel
NoYesNov 12, 2025
CVE-2025-40210MEDIUM5.1
  • Linux KernelLinux Kernel
  • kernel-tools-libs-devel
NoYesNov 21, 2025
CVE-2025-40212N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k
NoYesNov 24, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management