CVE-2025-22036
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2025-22036 is a vulnerability discovered in the Linux kernel's exFAT filesystem implementation that was disclosed on April 16, 2025. The vulnerability involves random stack corruption that occurs after the getblock operation when a bufferhead is allocated on the stack, such as in dompagereadpage operations (NVD, Red Hat CVE).

Technical details

The vulnerability manifests as a race condition that leads to bufferhead Use-After-Free (UAF) when getblock is called with a bufferhead allocated on the stack. The issue occurs in a specific sequence of operations involving mpagereadfolio, dompagereadpage, exfatgetblock, and related functions, ultimately resulting in stack corruption when atomicdec(bh->b_count) is called. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (Red Hat CVE).

Impact

The vulnerability can lead to stack corruption in the Linux kernel when accessing exFAT filesystems, potentially causing system instability or crashes. The CVSS scoring indicates that while the vulnerability requires local access and cannot directly compromise confidentiality or integrity, it can have a high impact on system availability (Red Hat CVE).

Mitigation and workarounds

A fix has been implemented that returns -EAGAIN if a folio does not have buffers when bhread needs to be called. This allows the caller to fall back to functions like blockreadfullfolio(), create a bufferhead in the folio, and then call getblock again. The fix has been incorporated into Linux kernel version 6.12.25-1 and backported to various distributions (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management