CVE-2025-22028: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: media: vimc: skip .s_stream() for stopped entities Syzbot reported [1] a warning prompted by a check in call_s_stream() that checks whether .s_stream() operation is warranted for unstarted or stopped subdevs. Add a simple fix in vimc_streamer_pipeline_terminate() ensuring that entities skip a call to .s_stream() unless they have been previously properly started. [1] Syzbot report: ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5933 at drivers/media/v4l2-core/v4l2-subdev.c:460 call_s_stream+0x2df/0x350 drivers/media/v4l2-core/v4l2-subdev.c:460 Modules linked in: CPU: 0 UID: 0 PID: 5933 Comm: syz-executor330 Not tainted 6.13.0-rc2-syzkaller-00362-g2d8308bf5b67 #0 ... Call Trace: <TASK> vimc_streamer_pipeline_terminate+0x218/0x320 drivers/media/test-drivers/vimc/vimc-streamer.c:62 vimc_streamer_pipeline_init drivers/media/test-drivers/vimc/vimc-streamer.c:101 [inline] vimc_streamer_s_stream+0x650/0x9a0 drivers/media/test-drivers/vimc/vimc-streamer.c:203 vimc_capture_start_streaming+0xa1/0x130 drivers/media/test-drivers/vimc/vimc-capture.c:256 vb2_start_streaming+0x15f/0x5a0 drivers/media/common/videobuf2/videobuf2-core.c:1789 vb2_core_streamon+0x2a7/0x450 drivers/media/common/videobuf2/videobuf2-core.c:2348 vb2_streamon drivers/media/common/videobuf2/videobuf2-v4l2.c:875 [inline] vb2_ioctl_streamon+0xf4/0x170 drivers/media/common/videobuf2/videobuf2-v4l2.c:1118 __video_do_ioctl+0xaf0/0xf00 drivers/media/v4l2-core/v4l2-ioctl.c:3122 video_usercopy+0x4d2/0x1620 drivers/media/v4l2-core/v4l2-ioctl.c:3463 v4l2_ioctl+0x1ba/0x250 drivers/media/v4l2-core/v4l2-dev.c:366 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:906 [inline] __se_sys_ioctl fs/ioctl.c:892 [inline] __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f2b85c01b19 ...
AI Analysis
Technical Summary
CVE-2025-22028 is a vulnerability identified in the Linux kernel specifically related to the media subsystem, more precisely the vimc (Virtual Media Controller) driver. The issue arises from improper handling of the .s_stream() operation for subdevices (subdevs) that are either unstarted or stopped. The vulnerability was reported by Syzbot, an automated kernel fuzzing system, which detected a warning triggered by the call_s_stream() function. This function checks whether the .s_stream() operation should be invoked on subdevs, but prior to the fix, it did not properly skip this call for entities that had not been started or were already stopped. This could lead to unexpected behavior or kernel warnings, potentially causing instability or denial of service in the media subsystem. The root cause was that the vimc_streamer_pipeline_terminate() function did not ensure that .s_stream() was only called on entities that had been properly started. The fix involved adding a check to skip the .s_stream() call unless the entity was previously started, thus preventing the warning and potential misuse of the streaming operation on invalid states. This vulnerability affects specific Linux kernel versions identified by their commit hashes, including versions around 6.13.0-rc2. The issue is located in the media drivers, particularly those related to video4linux2 (v4l2) and the vimc test drivers. The vulnerability does not have a CVSS score assigned yet and there are no known exploits in the wild as of the published date. Because the vulnerability is in a kernel driver related to media streaming, exploitation would likely require local access and interaction with the media subsystem, possibly through ioctl calls to the video device interfaces. The impact is primarily on system stability and reliability rather than direct privilege escalation or data leakage, but improper handling of kernel operations can sometimes be leveraged in complex attack chains.
Potential Impact
For European organizations, the impact of CVE-2025-22028 depends largely on the deployment of Linux systems utilizing the affected kernel versions and specifically the vimc media driver. Organizations using Linux servers or workstations for media processing, video streaming, or development environments that include the vimc driver could experience kernel warnings or crashes leading to denial of service conditions. This could disrupt services relying on media capture or streaming, such as video conferencing, surveillance systems, or multimedia processing pipelines. While the vulnerability does not appear to directly enable privilege escalation or remote code execution, the instability caused by improper kernel operations can degrade system availability and reliability. In critical infrastructure or industrial environments where Linux-based media devices are used, this could impact operational continuity. Additionally, organizations with development or testing environments using the vimc driver might face increased debugging and maintenance overhead. Given the lack of known exploits and the requirement for local interaction with the media subsystem, the threat is more relevant to organizations with direct access to affected Linux systems rather than remote attackers. However, insider threats or compromised local users could potentially trigger the vulnerability to cause denial of service.
Mitigation Recommendations
1. Update the Linux kernel to a version that includes the fix for CVE-2025-22028. Monitor kernel release notes and apply patches promptly, especially if using kernel versions around 6.13.0-rc2 or those identified by the affected commit hashes. 2. For systems where immediate kernel updates are not feasible, consider disabling or unloading the vimc media driver if it is not required, to eliminate the attack surface. 3. Restrict access to media device interfaces (e.g., /dev/video*) using strict permissions and access control mechanisms to prevent unauthorized local users from interacting with the vulnerable driver. 4. Implement monitoring for kernel warnings and errors related to media subsystem operations to detect potential exploitation attempts or instability caused by this vulnerability. 5. In development and testing environments, ensure that fuzzing tools like Syzbot are used to proactively identify similar issues and validate kernel stability after updates. 6. Educate system administrators and security teams about the specific nature of this vulnerability to prioritize patching and access controls appropriately.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-22028: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: media: vimc: skip .s_stream() for stopped entities Syzbot reported [1] a warning prompted by a check in call_s_stream() that checks whether .s_stream() operation is warranted for unstarted or stopped subdevs. Add a simple fix in vimc_streamer_pipeline_terminate() ensuring that entities skip a call to .s_stream() unless they have been previously properly started. [1] Syzbot report: ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5933 at drivers/media/v4l2-core/v4l2-subdev.c:460 call_s_stream+0x2df/0x350 drivers/media/v4l2-core/v4l2-subdev.c:460 Modules linked in: CPU: 0 UID: 0 PID: 5933 Comm: syz-executor330 Not tainted 6.13.0-rc2-syzkaller-00362-g2d8308bf5b67 #0 ... Call Trace: <TASK> vimc_streamer_pipeline_terminate+0x218/0x320 drivers/media/test-drivers/vimc/vimc-streamer.c:62 vimc_streamer_pipeline_init drivers/media/test-drivers/vimc/vimc-streamer.c:101 [inline] vimc_streamer_s_stream+0x650/0x9a0 drivers/media/test-drivers/vimc/vimc-streamer.c:203 vimc_capture_start_streaming+0xa1/0x130 drivers/media/test-drivers/vimc/vimc-capture.c:256 vb2_start_streaming+0x15f/0x5a0 drivers/media/common/videobuf2/videobuf2-core.c:1789 vb2_core_streamon+0x2a7/0x450 drivers/media/common/videobuf2/videobuf2-core.c:2348 vb2_streamon drivers/media/common/videobuf2/videobuf2-v4l2.c:875 [inline] vb2_ioctl_streamon+0xf4/0x170 drivers/media/common/videobuf2/videobuf2-v4l2.c:1118 __video_do_ioctl+0xaf0/0xf00 drivers/media/v4l2-core/v4l2-ioctl.c:3122 video_usercopy+0x4d2/0x1620 drivers/media/v4l2-core/v4l2-ioctl.c:3463 v4l2_ioctl+0x1ba/0x250 drivers/media/v4l2-core/v4l2-dev.c:366 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:906 [inline] __se_sys_ioctl fs/ioctl.c:892 [inline] __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f2b85c01b19 ...
AI-Powered Analysis
Technical Analysis
CVE-2025-22028 is a vulnerability identified in the Linux kernel specifically related to the media subsystem, more precisely the vimc (Virtual Media Controller) driver. The issue arises from improper handling of the .s_stream() operation for subdevices (subdevs) that are either unstarted or stopped. The vulnerability was reported by Syzbot, an automated kernel fuzzing system, which detected a warning triggered by the call_s_stream() function. This function checks whether the .s_stream() operation should be invoked on subdevs, but prior to the fix, it did not properly skip this call for entities that had not been started or were already stopped. This could lead to unexpected behavior or kernel warnings, potentially causing instability or denial of service in the media subsystem. The root cause was that the vimc_streamer_pipeline_terminate() function did not ensure that .s_stream() was only called on entities that had been properly started. The fix involved adding a check to skip the .s_stream() call unless the entity was previously started, thus preventing the warning and potential misuse of the streaming operation on invalid states. This vulnerability affects specific Linux kernel versions identified by their commit hashes, including versions around 6.13.0-rc2. The issue is located in the media drivers, particularly those related to video4linux2 (v4l2) and the vimc test drivers. The vulnerability does not have a CVSS score assigned yet and there are no known exploits in the wild as of the published date. Because the vulnerability is in a kernel driver related to media streaming, exploitation would likely require local access and interaction with the media subsystem, possibly through ioctl calls to the video device interfaces. The impact is primarily on system stability and reliability rather than direct privilege escalation or data leakage, but improper handling of kernel operations can sometimes be leveraged in complex attack chains.
Potential Impact
For European organizations, the impact of CVE-2025-22028 depends largely on the deployment of Linux systems utilizing the affected kernel versions and specifically the vimc media driver. Organizations using Linux servers or workstations for media processing, video streaming, or development environments that include the vimc driver could experience kernel warnings or crashes leading to denial of service conditions. This could disrupt services relying on media capture or streaming, such as video conferencing, surveillance systems, or multimedia processing pipelines. While the vulnerability does not appear to directly enable privilege escalation or remote code execution, the instability caused by improper kernel operations can degrade system availability and reliability. In critical infrastructure or industrial environments where Linux-based media devices are used, this could impact operational continuity. Additionally, organizations with development or testing environments using the vimc driver might face increased debugging and maintenance overhead. Given the lack of known exploits and the requirement for local interaction with the media subsystem, the threat is more relevant to organizations with direct access to affected Linux systems rather than remote attackers. However, insider threats or compromised local users could potentially trigger the vulnerability to cause denial of service.
Mitigation Recommendations
1. Update the Linux kernel to a version that includes the fix for CVE-2025-22028. Monitor kernel release notes and apply patches promptly, especially if using kernel versions around 6.13.0-rc2 or those identified by the affected commit hashes. 2. For systems where immediate kernel updates are not feasible, consider disabling or unloading the vimc media driver if it is not required, to eliminate the attack surface. 3. Restrict access to media device interfaces (e.g., /dev/video*) using strict permissions and access control mechanisms to prevent unauthorized local users from interacting with the vulnerable driver. 4. Implement monitoring for kernel warnings and errors related to media subsystem operations to detect potential exploitation attempts or instability caused by this vulnerability. 5. In development and testing environments, ensure that fuzzing tools like Syzbot are used to proactively identify similar issues and validate kernel stability after updates. 6. Educate system administrators and security teams about the specific nature of this vulnerability to prioritize patching and access controls appropriately.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.808Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdd3e8
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 7/3/2025, 7:56:42 PM
Last updated: 7/27/2025, 9:21:25 PM
Views: 8
Related Threats
CVE-2025-6572: CWE-79 Cross-Site Scripting (XSS) in OpenStreetMap for Gutenberg and WPBakery Page Builder (formerly Visual Composer)
HighCVE-2025-54959: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Mubit co.,ltd. Powered BLUE 870
MediumCVE-2025-54958: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Mubit co.,ltd. Powered BLUE 870
MediumCVE-2025-54940: Code injection in WPEngine, Inc. Advanced Custom Fields
LowCVE-2025-8708: Deserialization in Antabot White-Jotter
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.