CVE-2025-21632
Linux Kernel vulnerability analysis and mitigation

Overview

In the Linux kernel, a vulnerability (CVE-2025-21632) was discovered in the x86 shadow stack support implementation. The issue affects the ptrace interface for shadow stack registers, which are XSAVE-managed supervisor state components. The vulnerability was discovered in January 2025 and affects the Linux kernel's x86/fpu subsystem (Kernel Git).

Technical details

The vulnerability stems from improper handling of the regset code's ->active() handler in ptrace operations. While the handler verifies shadow stack enablement via the ARCH_SHSTK_SHSTK bit in the thread struct, this check was not properly implemented in the ptrace interface. This oversight allows both set/get handlers to be called with XFEATURE_CET_USER in its init state, potentially causing get_xsave_addr() to return NULL and trigger a WARN_ON(). While the ssp_set() handler had a protective check through ssp_active(), the ssp_get() handler lacked this protection, leading to kernel warnings when shadow stacks are disabled (Kernel Git).

Impact

When exploited, this vulnerability can trigger kernel warnings and potentially cause system instability. The issue specifically affects the handling of shadow stack registers through the ptrace interface, which could impact debugging and system monitoring capabilities (Kernel Git).

Mitigation and workarounds

The issue has been fixed by adding a proper check to ensure shadow stacks are active in a thread before attempting to look them up in the XSAVE buffer. The fix involves modifying the ssp_get() function to verify both cpu_feature_enabled(X86_FEATURE_USER_SHSTK) and ssp_active(target, regset) conditions (Kernel Git).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-71142N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel-matched
NoNoJan 14, 2026
CVE-2025-71137N/AN/A
  • Linux KernelLinux Kernel
  • linux-gcp
NoYesJan 14, 2026
CVE-2025-71135N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-core
NoNoJan 14, 2026
CVE-2025-71134N/AN/A
  • Linux KernelLinux Kernel
  • kernel-uki-virt
NoNoJan 14, 2026
CVE-2025-71133N/AN/A
  • Linux KernelLinux Kernel
  • kernel-modules-extra
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management