CVE-2025-22000: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: drop beyond-EOF folios with the right number of refs When an after-split folio is large and needs to be dropped due to EOF, folio_put_refs(folio, folio_nr_pages(folio)) should be used to drop all page cache refs. Otherwise, the folio will not be freed, causing memory leak. This leak would happen on a filesystem with blocksize > page_size and a truncate is performed, where the blocksize makes folios split to >0 order ones, causing truncated folios not being freed.
AI Analysis
Technical Summary
CVE-2025-22000 is a vulnerability identified in the Linux kernel's memory management subsystem, specifically within the handling of huge memory pages (folios) in the mm/huge_memory component. The issue arises when a filesystem with a block size larger than the system's page size performs a truncate operation. In such cases, the kernel splits folios into higher order pages (order > 0). However, the code responsible for dropping folios beyond the end-of-file (EOF) does not correctly release all page cache references. The function folio_put_refs(folio, folio_nr_pages(folio)) should be called to release all references, but this is not done properly, resulting in folios not being freed. Consequently, this leads to a memory leak within the kernel's page cache. Over time, this leak can cause increased memory consumption, potentially degrading system performance or causing resource exhaustion. The vulnerability is rooted in incorrect reference counting and memory management logic during truncation operations on filesystems with block sizes exceeding the page size. No known exploits are reported in the wild as of the publication date, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions identified by the commit hash c010d47f107f609b9f4d6a103b6dfc53889049e9 or similar. The issue has been publicly disclosed and patched in the Linux kernel source, although patch links are not provided in the data. This vulnerability does not require user interaction or authentication to be triggered, as it is related to kernel-level memory management triggered by filesystem operations.
Potential Impact
For European organizations, the impact of CVE-2025-22000 primarily concerns systems running Linux kernels vulnerable to this memory leak, especially those utilizing filesystems with block sizes larger than the system page size and performing frequent truncate operations. The memory leak can lead to gradual degradation of system stability and performance, potentially causing critical services to slow down or crash due to resource exhaustion. This is particularly relevant for servers handling large file operations, such as file servers, database servers, and cloud infrastructure nodes. In environments with high uptime requirements, such as financial institutions, healthcare providers, and critical infrastructure operators, this vulnerability could indirectly affect availability and reliability. Although it does not directly compromise confidentiality or integrity, the resulting denial of service conditions could disrupt business operations and service delivery. Since no known exploits are currently in the wild, the immediate risk is moderate, but the vulnerability should be addressed promptly to prevent future exploitation or operational issues.
Mitigation Recommendations
To mitigate CVE-2025-22000, organizations should: 1) Apply the latest Linux kernel patches that address this memory leak as soon as they become available from trusted sources or Linux distributions. 2) Identify and monitor systems running affected kernel versions, especially those using filesystems with block sizes larger than the page size (e.g., certain configurations of XFS or ext4). 3) Implement proactive monitoring of kernel memory usage and page cache statistics to detect abnormal memory growth that could indicate the presence of this leak. 4) Where feasible, consider adjusting filesystem block sizes to align with the system page size to reduce the likelihood of triggering the bug. 5) In containerized or virtualized environments, ensure that host kernels are patched promptly, as guest systems rely on host kernel stability. 6) Maintain robust system restart and maintenance schedules to clear leaked memory if patching cannot be immediately applied. 7) Engage with Linux distribution vendors or security mailing lists to receive timely updates and advisories related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2025-22000: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: drop beyond-EOF folios with the right number of refs When an after-split folio is large and needs to be dropped due to EOF, folio_put_refs(folio, folio_nr_pages(folio)) should be used to drop all page cache refs. Otherwise, the folio will not be freed, causing memory leak. This leak would happen on a filesystem with blocksize > page_size and a truncate is performed, where the blocksize makes folios split to >0 order ones, causing truncated folios not being freed.
AI-Powered Analysis
Technical Analysis
CVE-2025-22000 is a vulnerability identified in the Linux kernel's memory management subsystem, specifically within the handling of huge memory pages (folios) in the mm/huge_memory component. The issue arises when a filesystem with a block size larger than the system's page size performs a truncate operation. In such cases, the kernel splits folios into higher order pages (order > 0). However, the code responsible for dropping folios beyond the end-of-file (EOF) does not correctly release all page cache references. The function folio_put_refs(folio, folio_nr_pages(folio)) should be called to release all references, but this is not done properly, resulting in folios not being freed. Consequently, this leads to a memory leak within the kernel's page cache. Over time, this leak can cause increased memory consumption, potentially degrading system performance or causing resource exhaustion. The vulnerability is rooted in incorrect reference counting and memory management logic during truncation operations on filesystems with block sizes exceeding the page size. No known exploits are reported in the wild as of the publication date, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions identified by the commit hash c010d47f107f609b9f4d6a103b6dfc53889049e9 or similar. The issue has been publicly disclosed and patched in the Linux kernel source, although patch links are not provided in the data. This vulnerability does not require user interaction or authentication to be triggered, as it is related to kernel-level memory management triggered by filesystem operations.
Potential Impact
For European organizations, the impact of CVE-2025-22000 primarily concerns systems running Linux kernels vulnerable to this memory leak, especially those utilizing filesystems with block sizes larger than the system page size and performing frequent truncate operations. The memory leak can lead to gradual degradation of system stability and performance, potentially causing critical services to slow down or crash due to resource exhaustion. This is particularly relevant for servers handling large file operations, such as file servers, database servers, and cloud infrastructure nodes. In environments with high uptime requirements, such as financial institutions, healthcare providers, and critical infrastructure operators, this vulnerability could indirectly affect availability and reliability. Although it does not directly compromise confidentiality or integrity, the resulting denial of service conditions could disrupt business operations and service delivery. Since no known exploits are currently in the wild, the immediate risk is moderate, but the vulnerability should be addressed promptly to prevent future exploitation or operational issues.
Mitigation Recommendations
To mitigate CVE-2025-22000, organizations should: 1) Apply the latest Linux kernel patches that address this memory leak as soon as they become available from trusted sources or Linux distributions. 2) Identify and monitor systems running affected kernel versions, especially those using filesystems with block sizes larger than the page size (e.g., certain configurations of XFS or ext4). 3) Implement proactive monitoring of kernel memory usage and page cache statistics to detect abnormal memory growth that could indicate the presence of this leak. 4) Where feasible, consider adjusting filesystem block sizes to align with the system page size to reduce the likelihood of triggering the bug. 5) In containerized or virtualized environments, ensure that host kernels are patched promptly, as guest systems rely on host kernel stability. 6) Maintain robust system restart and maintenance schedules to clear leaked memory if patching cannot be immediately applied. 7) Engage with Linux distribution vendors or security mailing lists to receive timely updates and advisories related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.802Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe8eb4
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 11:43:10 AM
Last updated: 8/11/2025, 1:33:35 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.