CVE-2025-22099

5.5 MEDIUM

📋 TL;DR

This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's Xilinx ZynqMP display subsystem driver. If exploited, it could cause a kernel panic or system crash on systems using this driver. The vulnerability affects Linux systems with Xilinx ZynqMP hardware and the vulnerable driver loaded.

💻 Affected Systems

Products:
  • Linux kernel with Xilinx ZynqMP display subsystem driver
Versions: Linux kernel versions containing the vulnerable code before the fix commits
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if the Xilinx ZynqMP display subsystem driver (zynqmp_dpsub) is loaded and used. This typically requires specific Xilinx ZynqMP hardware.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical access to restart the system.

🟠

Likely Case

System crash or kernel panic when the vulnerable audio initialization code path is triggered, resulting in temporary denial of service.

🟢

If Mitigated

No impact if the vulnerable driver is not loaded or the system doesn't use Xilinx ZynqMP hardware with display subsystem features.

🌐 Internet-Facing: LOW - This is a local kernel driver vulnerability requiring local access or ability to trigger the specific driver functionality.
🏢 Internal Only: MEDIUM - Internal users with local access could potentially trigger the crash, but exploitation requires specific conditions and driver usage.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to trigger the specific audio initialization code path in the driver. No known public exploits exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits 066d6f22e7d84953db6bbf2dae507401157660c6 and d0660f9c588a1246a1a543c91a1e3cad910237da

Vendor Advisory: https://git.kernel.org/stable/c/066d6f22e7d84953db6bbf2dae507401157660c6

Restart Required: Yes

Instructions:

1. Update to a Linux kernel version containing the fix commits. 2. Rebuild kernel if using custom kernel. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable vulnerable driver module

linux

Prevent loading of the vulnerable zynqmp_dpsub driver module

echo 'blacklist zynqmp_dpsub' >> /etc/modprobe.d/blacklist.conf
rmmod zynqmp_dpsub

🧯 If You Can't Patch

  • Ensure the zynqmp_dpsub kernel module is not loaded on systems without Xilinx ZynqMP hardware
  • Restrict local user access to systems with vulnerable driver loaded

🔍 How to Verify

Check if Vulnerable:

Check if zynqmp_dpsub module is loaded: lsmod | grep zynqmp_dpsub. If loaded, check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or check that NULL pointer checks exist in zynqmp_audio_init function in driver source.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • NULL pointer dereference errors in kernel logs

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Search for kernel panic events or NULL pointer dereference errors in system logs

🔗 References

📤 Share & Export