Skip to main content

CVE-2025-22069: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-22069cvecve-2025-22069
Published: Wed Apr 16 2025 (04/16/2025, 14:12:22 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: riscv: fgraph: Fix stack layout to match __arch_ftrace_regs argument of ftrace_return_to_handler Naresh Kamboju reported a "Bad frame pointer" kernel warning while running LTP trace ftrace_stress_test.sh in riscv. We can reproduce the same issue with the following command: ``` $ cd /sys/kernel/debug/tracing $ echo 'f:myprobe do_nanosleep%return args1=$retval' > dynamic_events $ echo 1 > events/fprobes/enable $ echo 1 > tracing_on $ sleep 1 ``` And we can get the following kernel warning: [ 127.692888] ------------[ cut here ]------------ [ 127.693755] Bad frame pointer: expected ff2000000065be50, received ba34c141e9594000 [ 127.693755] from func do_nanosleep return to ffffffff800ccb16 [ 127.698699] WARNING: CPU: 1 PID: 129 at kernel/trace/fgraph.c:755 ftrace_return_to_handler+0x1b2/0x1be [ 127.699894] Modules linked in: [ 127.700908] CPU: 1 UID: 0 PID: 129 Comm: sleep Not tainted 6.14.0-rc3-g0ab191c74642 #32 [ 127.701453] Hardware name: riscv-virtio,qemu (DT) [ 127.701859] epc : ftrace_return_to_handler+0x1b2/0x1be [ 127.702032] ra : ftrace_return_to_handler+0x1b2/0x1be [ 127.702151] epc : ffffffff8013b5e0 ra : ffffffff8013b5e0 sp : ff2000000065bd10 [ 127.702221] gp : ffffffff819c12f8 tp : ff60000080853100 t0 : 6e00000000000000 [ 127.702284] t1 : 0000000000000020 t2 : 6e7566206d6f7266 s0 : ff2000000065bd80 [ 127.702346] s1 : ff60000081262000 a0 : 000000000000007b a1 : ffffffff81894f20 [ 127.702408] a2 : 0000000000000010 a3 : fffffffffffffffe a4 : 0000000000000000 [ 127.702470] a5 : 0000000000000000 a6 : 0000000000000008 a7 : 0000000000000038 [ 127.702530] s2 : ba34c141e9594000 s3 : 0000000000000000 s4 : ff2000000065bdd0 [ 127.702591] s5 : 00007fff8adcf400 s6 : 000055556dc1d8c0 s7 : 0000000000000068 [ 127.702651] s8 : 00007fff8adf5d10 s9 : 000000000000006d s10: 0000000000000001 [ 127.702710] s11: 00005555737377c8 t3 : ffffffff819d899e t4 : ffffffff819d899e [ 127.702769] t5 : ffffffff819d89a0 t6 : ff2000000065bb18 [ 127.702826] status: 0000000200000120 badaddr: 0000000000000000 cause: 0000000000000003 [ 127.703292] [<ffffffff8013b5e0>] ftrace_return_to_handler+0x1b2/0x1be [ 127.703760] [<ffffffff80017bce>] return_to_handler+0x16/0x26 [ 127.704009] [<ffffffff80017bb8>] return_to_handler+0x0/0x26 [ 127.704057] [<ffffffff800d3352>] common_nsleep+0x42/0x54 [ 127.704117] [<ffffffff800d44a2>] __riscv_sys_clock_nanosleep+0xba/0x10a [ 127.704176] [<ffffffff80901c56>] do_trap_ecall_u+0x188/0x218 [ 127.704295] [<ffffffff8090cc3e>] handle_exception+0x14a/0x156 [ 127.705436] ---[ end trace 0000000000000000 ]--- The reason is that the stack layout for constructing argument for the ftrace_return_to_handler in the return_to_handler does not match the __arch_ftrace_regs structure of riscv, leading to unexpected results.

AI-Powered Analysis

AILast updated: 07/03/2025, 20:55:04 UTC

Technical Analysis

CVE-2025-22069 is a vulnerability identified in the Linux kernel specifically affecting the RISC-V architecture implementation of the ftrace subsystem. The issue arises from a mismatch in the stack layout used to construct arguments for the function ftrace_return_to_handler within the return_to_handler routine. This mismatch causes the stack frame pointer to be incorrect, leading to kernel warnings such as "Bad frame pointer" and potentially unstable kernel behavior. The vulnerability was discovered when running the Linux Test Project (LTP) trace ftrace_stress_test.sh on RISC-V, which triggered kernel warnings indicating corrupted stack frames. The root cause is that the stack layout does not align with the __arch_ftrace_regs structure expected by the RISC-V architecture, causing unexpected results during function tracing. This flaw can lead to kernel instability or crashes when the ftrace subsystem is used, particularly when dynamic fprobes are enabled and tracing is active. The vulnerability affects Linux kernel versions containing the specified commit hashes and was publicly disclosed in April 2025. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2025-22069 depends largely on their use of Linux systems running on RISC-V architecture, which is currently less common than x86 or ARM architectures but is gaining traction in embedded systems, IoT devices, and specialized computing environments. If exploited or triggered unintentionally, this vulnerability could cause kernel panics or instability, leading to denial of service conditions on affected systems. This could disrupt critical services, particularly in sectors relying on embedded Linux devices such as telecommunications, industrial control systems, and research institutions experimenting with RISC-V hardware. Although no direct remote exploitation vector is described, the vulnerability could be triggered locally by users or processes with the ability to enable ftrace probes, potentially allowing for privilege escalation or system disruption. The lack of a known exploit reduces immediate risk, but the kernel instability could still affect system reliability and availability, impacting operational continuity and potentially leading to data loss or service outages in sensitive environments.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched, especially if they operate RISC-V based systems. Since the issue relates to the ftrace subsystem, administrators should consider disabling dynamic fprobes or tracing features on RISC-V systems if kernel updates cannot be immediately applied. Additionally, restricting access to the /sys/kernel/debug/tracing interface to trusted users only can reduce the risk of local exploitation. Organizations should audit their use of RISC-V Linux systems and evaluate whether ftrace functionality is necessary for their operations. Implementing kernel hardening measures and monitoring kernel logs for unusual ftrace warnings can help detect attempts to trigger this vulnerability. For embedded or IoT devices, firmware updates incorporating the patched kernel should be deployed promptly. Finally, maintaining a robust incident response plan to address potential kernel crashes or denial of service events will help mitigate operational impacts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.814Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9831c4522896dcbe7fc0

Added to database: 5/21/2025, 9:09:05 AM

Last enriched: 7/3/2025, 8:55:04 PM

Last updated: 7/29/2025, 2:32:29 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats