CVE-2025-22090
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2025-22090 is a vulnerability discovered in the Linux kernel affecting the x86/mm/pat handling when fork() fails in copypagerange(). The vulnerability was disclosed on April 16, 2025, and affects various Linux distributions including Debian and Red Hat Enterprise Linux systems (NVD, Debian Tracker).

Technical details

The vulnerability occurs when trackpfncopy() fails after adding the destination VMA to the maple tree. During fork() failure, the cleanup process encounters the destination VMA without proper reservation or copied page tables. This causes untrack_pfn() to attempt retrieving PAT information from non-existent page tables. The issue has been assigned a CVSS v3.1 score of 5.5 (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) indicating moderate severity (Red Hat).

Impact

The vulnerability can lead to system instability when the fork() operation fails. The issue specifically affects the memory management subsystem of the Linux kernel, potentially causing system crashes or memory-related errors when attempting to handle page table entries during process forking operations (NVD).

Mitigation and workarounds

The vulnerability has been fixed in Linux kernel version 6.12.25-1 for Debian systems. For Red Hat Enterprise Linux 9, the fix has been deferred. The proper fix involves setting the VM_PAT flag only after successful reservation and implementing proper cleanup procedures when operations fail (Debian Tracker, Red Hat).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management