CVE-2025-22069
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2025-22069 is a vulnerability discovered in the Linux kernel, specifically affecting the RISC-V architecture's ftrace functionality. The vulnerability was disclosed on April 16, 2025, and involves a stack layout mismatch in the ftracereturntohandler function. The issue was initially reported by Naresh Kamboju while running LTP trace ftracestress_test.sh on RISC-V systems (NVD).

Technical details

The vulnerability stems from a misalignment between the stack layout for constructing arguments in the ftracereturntohandler function and the _archftraceregs structure of RISC-V. According to Red Hat's assessment, this vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 with the vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local access requirements and potential high impact on availability (Red Hat).

Impact

The vulnerability results in a 'Bad frame pointer' kernel warning and can lead to unexpected system behavior. When triggered, it causes the system to display kernel warnings with mismatched frame pointer values, potentially affecting system stability and functionality (Debian).

Mitigation and workarounds

The issue has been fixed in various Linux distributions. Debian has marked the vulnerability as fixed in bullseye (5.10.234-1) and bookworm (6.1.133-1) releases, while it remains vulnerable in trixie and sid versions. Red Hat Enterprise Linux versions 6, 7, 8, and 9 are not affected by this vulnerability (Debian, Red Hat).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management