{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-22035","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-12-29T08:45:45.809Z","datePublished":"2025-04-16T14:11:53.958Z","dateUpdated":"2026-05-11T21:11:22.784Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:11:22.784Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix use-after-free in print_graph_function_flags during tracer switching\n\nKairui reported a UAF issue in print_graph_function_flags() during\nftrace stress testing [1]. This issue can be reproduced if puting a\n'mdelay(10)' after 'mutex_unlock(&trace_types_lock)' in s_start(),\nand executing the following script:\n\n  $ echo function_graph > current_tracer\n  $ cat trace > /dev/null &\n  $ sleep 5  # Ensure the 'cat' reaches the 'mdelay(10)' point\n  $ echo timerlat > current_tracer\n\nThe root cause lies in the two calls to print_graph_function_flags\nwithin print_trace_line during each s_show():\n\n  * One through 'iter->trace->print_line()';\n  * Another through 'event->funcs->trace()', which is hidden in\n    print_trace_fmt() before print_trace_line returns.\n\nTracer switching only updates the former, while the latter continues\nto use the print_line function of the old tracer, which in the script\nabove is print_graph_function_flags.\n\nMoreover, when switching from the 'function_graph' tracer to the\n'timerlat' tracer, s_start only calls graph_trace_close of the\n'function_graph' tracer to free 'iter->private', but does not set\nit to NULL. This provides an opportunity for 'event->funcs->trace()'\nto use an invalid 'iter->private'.\n\nTo fix this issue, set 'iter->private' to NULL immediately after\nfreeing it in graph_trace_close(), ensuring that an invalid pointer\nis not passed to other tracers. Additionally, clean up the unnecessary\n'iter->private = NULL' during each 'cat trace' when using wakeup and\nirqsoff tracers.\n\n [1] https://lore.kernel.org/all/20231112150030.84609-1-ryncsn@gmail.com/"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/trace/trace_functions_graph.c","kernel/trace/trace_irqsoff.c","kernel/trace/trace_sched_wakeup.c"],"versions":[{"version":"05319d707732c728eb721ac616a50e7978eb499a","lessThan":"42561fe62c3628ea3bc9623f64f047605e98857f","status":"affected","versionType":"git"},{"version":"b8205dfed68183dc1470e83863c5ded6d7fa30a9","lessThan":"de7b309139f862a44379ecd96e93c9133c69f813","status":"affected","versionType":"git"},{"version":"ce6e2b14bc094866d9173db6935da2d752f06d8b","lessThan":"81a85b12132c8ffe98f5ddbdc185481790aeaa1b","status":"affected","versionType":"git"},{"version":"2cb0c037c927db4ec928cc927488e52aa359786e","lessThan":"a2cce54c1748216535dda02e185d07a084be837e","status":"affected","versionType":"git"},{"version":"eecb91b9f98d6427d4af5fdb8f108f52572a39e7","lessThan":"099ef3385800828b74933a96c117574637c3fb3a","status":"affected","versionType":"git"},{"version":"eecb91b9f98d6427d4af5fdb8f108f52572a39e7","lessThan":"c85efe6e13743cac6ba4ccf144cb91f44c86231a","status":"affected","versionType":"git"},{"version":"eecb91b9f98d6427d4af5fdb8f108f52572a39e7","lessThan":"f14752d66056d0c7bffe5092130409417d3baa70","status":"affected","versionType":"git"},{"version":"eecb91b9f98d6427d4af5fdb8f108f52572a39e7","lessThan":"70be951bc01e4a0e10d443f3510bb17426f257fb","status":"affected","versionType":"git"},{"version":"eecb91b9f98d6427d4af5fdb8f108f52572a39e7","lessThan":"7f81f27b1093e4895e87b74143c59c055c3b1906","status":"affected","versionType":"git"},{"version":"d6b35c9a8d51032ed9890431da3ae39fe76c1ae3","status":"affected","versionType":"git"},{"version":"5d433eda76b66ab271f5924b26ddfec063eeb454","status":"affected","versionType":"git"},{"version":"2242640e9bd94e706acf75c60a2ab1d0e150e0fb","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/trace/trace_functions_graph.c","kernel/trace/trace_irqsoff.c","kernel/trace/trace_sched_wakeup.c"],"versions":[{"version":"6.5","status":"affected"},{"version":"0","lessThan":"6.5","status":"unaffected","versionType":"semver"},{"version":"5.4.292","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.236","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.180","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.134","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.87","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.23","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13.11","lessThanOrEqual":"6.13.*","status":"unaffected","versionType":"semver"},{"version":"6.14.2","lessThanOrEqual":"6.14.*","status":"unaffected","versionType":"semver"},{"version":"6.15","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.255","versionEndExcluding":"5.4.292"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.193","versionEndExcluding":"5.10.236"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.129","versionEndExcluding":"5.15.180"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.50","versionEndExcluding":"6.1.134"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5","versionEndExcluding":"6.6.87"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5","versionEndExcluding":"6.12.23"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5","versionEndExcluding":"6.13.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5","versionEndExcluding":"6.14.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5","versionEndExcluding":"6.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.14.324"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.293"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.13"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/42561fe62c3628ea3bc9623f64f047605e98857f"},{"url":"https://git.kernel.org/stable/c/de7b309139f862a44379ecd96e93c9133c69f813"},{"url":"https://git.kernel.org/stable/c/81a85b12132c8ffe98f5ddbdc185481790aeaa1b"},{"url":"https://git.kernel.org/stable/c/a2cce54c1748216535dda02e185d07a084be837e"},{"url":"https://git.kernel.org/stable/c/099ef3385800828b74933a96c117574637c3fb3a"},{"url":"https://git.kernel.org/stable/c/c85efe6e13743cac6ba4ccf144cb91f44c86231a"},{"url":"https://git.kernel.org/stable/c/f14752d66056d0c7bffe5092130409417d3baa70"},{"url":"https://git.kernel.org/stable/c/70be951bc01e4a0e10d443f3510bb17426f257fb"},{"url":"https://git.kernel.org/stable/c/7f81f27b1093e4895e87b74143c59c055c3b1906"}],"title":"tracing: Fix use-after-free in print_graph_function_flags during tracer switching","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2025-22035","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-04-21T14:57:52.767300Z"}}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-416","description":"CWE-416 Use After Free"}]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-21T15:01:46.658Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T19:41:18.919Z"}}]}}