CVE-2025-22096
Linux Debian vulnerability analysis and mitigation

Overview

A vulnerability in the Linux kernel's DRM/MSM/GEM subsystem was discovered and assigned CVE-2025-22096. The issue relates to incorrect error code handling in the msm_parse_deps() function, where the SUBMIT_ERROR() macro turns the error code negative, but an extra '-' operation incorrectly turns it back to positive EINVAL. This leads to the error code being passed to ERR_PTR(), and since positive values are not recognized by IS_ERR(), it eventually results in a kernel oops (NVD CVE, Debian Tracker).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 5.5 with the following vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. The technical issue stems from improper error code handling in the Linux kernel's DRM subsystem, specifically in the msm_parse_deps() function. The vulnerability occurs when the SUBMIT_ERROR() macro processes error codes, where an additional negative operation incorrectly converts the error value (Red Hat XML).

Impact

When exploited, this vulnerability leads to a kernel oops condition, potentially causing system instability or denial of service. The CVSS scoring indicates high impact on availability (A:H) while maintaining no impact on confidentiality (C:N) or integrity (I:N) (Red Hat XML).

Mitigation and workarounds

The vulnerability has been fixed by removing the extra '-' operation in the code. Various Linux distributions have addressed this issue in their releases: Debian Bookworm has fixed it in version 6.1.133-1, and Bullseye in version 5.10.234-1. Red Hat Enterprise Linux versions 6, 7, 8, and 9 are not affected by this vulnerability (Debian Tracker, Red Hat XML).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-33230HIGH7.3
  • Linux DebianLinux Debian
  • nvidia-cuda-toolkit
NoNoJan 20, 2026
CVE-2025-33229HIGH7.3
  • Linux DebianLinux Debian
  • nvidia-cuda-toolkit
NoNoJan 20, 2026
CVE-2025-33228HIGH7.3
  • Linux DebianLinux Debian
  • nvidia-cuda-toolkit
NoNoJan 20, 2026
CVE-2025-33231MEDIUM6.7
  • Linux DebianLinux Debian
  • nvidia-cuda-toolkit
NoNoJan 20, 2026
CVE-2025-15281N/AN/A
  • WolfiWolfi
  • glibc-langpack-anp
NoYesJan 20, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management