๐Ÿ” CVE Alert

CVE-2025-22045

UNKNOWN 0.0

x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs On the following path, flush_tlb_range() can be used for zapping normal PMD entries (PMD entries that point to page tables) together with the PTE entries in the pointed-to page table: collapse_pte_mapped_thp pmdp_collapse_flush flush_tlb_range The arm64 version of flush_tlb_range() has a comment describing that it can be used for page table removal, and does not use any last-level invalidation optimizations. Fix the X86 version by making it behave the same way. Currently, X86 only uses this information for the following two purposes, which I think means the issue doesn't have much impact: - In native_flush_tlb_multi() for checking if lazy TLB CPUs need to be IPI'd to avoid issues with speculative page table walks. - In Hyper-V TLB paravirtualization, again for lazy TLB stuff. The patch "x86/mm: only invalidate final translations with INVLPGB" which is currently under review (see <https://lore.kernel.org/all/[email protected]/>) would probably be making the impact of this a lot worse.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
016c4d92cd16f569c6485ae62b076c1a4b779536 < 618d5612ecb7bfc1c85342daafeb2b47e29e77a3 016c4d92cd16f569c6485ae62b076c1a4b779536 < 556d446068f90981e5d71ca686bdaccdd545d491 016c4d92cd16f569c6485ae62b076c1a4b779536 < 0a8f806ea6b5dd64b3d1f05ff774817d5f7ddbd1 016c4d92cd16f569c6485ae62b076c1a4b779536 < 0708fd6bd8161871bfbadced2ca4319b84ab44fe 016c4d92cd16f569c6485ae62b076c1a4b779536 < 7085895c59e4057ffae17f58990ccb630087d0d2 016c4d92cd16f569c6485ae62b076c1a4b779536 < 93224deb50a8d20df3884f3672ce9f982129aa50 016c4d92cd16f569c6485ae62b076c1a4b779536 < 320ac1af4c0bdb92c864dc9250d1329234820edf 016c4d92cd16f569c6485ae62b076c1a4b779536 < 78d6f9a9eb2a5da6fcbd76d6191d24b0dcc321be 016c4d92cd16f569c6485ae62b076c1a4b779536 < 3ef938c3503563bfc2ac15083557f880d29c2e64
Linux / Linux
4.20

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/618d5612ecb7bfc1c85342daafeb2b47e29e77a3 git.kernel.org: https://git.kernel.org/stable/c/556d446068f90981e5d71ca686bdaccdd545d491 git.kernel.org: https://git.kernel.org/stable/c/0a8f806ea6b5dd64b3d1f05ff774817d5f7ddbd1 git.kernel.org: https://git.kernel.org/stable/c/0708fd6bd8161871bfbadced2ca4319b84ab44fe git.kernel.org: https://git.kernel.org/stable/c/7085895c59e4057ffae17f58990ccb630087d0d2 git.kernel.org: https://git.kernel.org/stable/c/93224deb50a8d20df3884f3672ce9f982129aa50 git.kernel.org: https://git.kernel.org/stable/c/320ac1af4c0bdb92c864dc9250d1329234820edf git.kernel.org: https://git.kernel.org/stable/c/78d6f9a9eb2a5da6fcbd76d6191d24b0dcc321be git.kernel.org: https://git.kernel.org/stable/c/3ef938c3503563bfc2ac15083557f880d29c2e64 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html