CVE-2025-22000
03.04.2025, 08:15
In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: drop beyond-EOF folios with the right number of refs When an after-split folio is large and needs to be dropped due to EOF, folio_put_refs(folio, folio_nr_pages(folio)) should be used to drop all page cache refs. Otherwise, the folio will not be freed, causing memory leak. This leak would happen on a filesystem with blocksize > page_size and a truncate is performed, where the blocksize makes folios split to >0 order ones, causing truncated folios not being freed.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 6.9 ≤ 𝑥 < 6.12.21 |
linux | linux_kernel | 6.13 ≤ 𝑥 < 6.13.9 |
linux | linux_kernel | 6.14:rc1 |
linux | linux_kernel | 6.14:rc2 |
linux | linux_kernel | 6.14:rc3 |
linux | linux_kernel | 6.14:rc4 |
linux | linux_kernel | 6.14:rc5 |
linux | linux_kernel | 6.14:rc6 |
linux | linux_kernel | 6.14:rc7 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
Vulnerability Media Exposure