CVE-2025-22056
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2025-22056 is a vulnerability discovered in the Linux kernel's netfilter component, specifically in the nfttunnel functionality. The vulnerability was disclosed on April 16, 2025, affecting the Linux kernel's handling of NFTATUNNELKEYOPTS_GENEVE attributes (NVD).

Technical details

The vulnerability stems from a type confusion issue in the netfilter's nfttunnel component when handling multiple NFTATUNNELKEYOPTSGENEVE attributes. The parsing logic should place every geneveopt structure compactly, but the current implementation performs incorrect type conversion before pointer addition, leading to a heap out-of-bounds write condition. This was confirmed through KASAN (Kernel Address Sanitizer) detection showing a slab-out-of-bounds write of size 124 bytes (NVD, Red Hat).

Impact

The vulnerability results in a heap out-of-bounds write condition which could potentially lead to memory corruption in the kernel. The severity is rated as Important with a CVSS v3.1 base score of 5.5 (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) (Red Hat).

Mitigation and workarounds

The vulnerability has been fixed in Linux kernel version 6.12.25-1 for the unstable branch. Various Linux distributions have released patches, including Debian which has marked the fix as available in version 6.12.25-1 while older versions remain vulnerable (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management