CVE-2025-37759: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ublk: fix handling recovery & reissue in ublk_abort_queue() Commit 8284066946e6 ("ublk: grab request reference when the request is handled by userspace") doesn't grab request reference in case of recovery reissue. Then the request can be requeued & re-dispatch & failed when canceling uring command. If it is one zc request, the request can be freed before io_uring returns the zc buffer back, then cause kernel panic: [ 126.773061] BUG: kernel NULL pointer dereference, address: 00000000000000c8 [ 126.773657] #PF: supervisor read access in kernel mode [ 126.774052] #PF: error_code(0x0000) - not-present page [ 126.774455] PGD 0 P4D 0 [ 126.774698] Oops: Oops: 0000 [#1] SMP NOPTI [ 126.775034] CPU: 13 UID: 0 PID: 1612 Comm: kworker/u64:55 Not tainted 6.14.0_blk+ #182 PREEMPT(full) [ 126.775676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39 04/01/2014 [ 126.776275] Workqueue: iou_exit io_ring_exit_work [ 126.776651] RIP: 0010:ublk_io_release+0x14/0x130 [ublk_drv] Fixes it by always grabbing request reference for aborting the request.
AI Analysis
Technical Summary
CVE-2025-37759 is a vulnerability identified in the Linux kernel's ublk (userspace block driver) subsystem. The issue stems from improper handling of request references during recovery and reissue operations within the ublk_abort_queue() function. Specifically, a commit (8284066946e6) intended to improve request reference management failed to grab a request reference when a request was reissued as part of recovery. This flaw allows a request to be requeued, redispatched, and potentially fail during cancellation. In scenarios involving zero-copy (zc) requests, this can lead to the request being freed prematurely before io_uring returns the zero-copy buffer, causing a kernel NULL pointer dereference and subsequent kernel panic. The kernel panic manifests as a supervisor read access fault at a null pointer offset, resulting in system instability and potential denial of service. The vulnerability is addressed by ensuring that the request reference is always grabbed when aborting a request, preventing premature freeing and use-after-free conditions. This vulnerability affects Linux kernel versions containing the specified commit and is relevant to systems utilizing the ublk driver and io_uring interface for high-performance asynchronous I/O operations. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to servers and infrastructure running affected Linux kernel versions with ublk and io_uring enabled. The impact includes potential denial of service through kernel panics, which can disrupt critical services, especially in data centers, cloud environments, and enterprise servers relying on Linux for storage and I/O operations. Systems handling high volumes of asynchronous I/O or leveraging zero-copy buffers are particularly vulnerable. The kernel panic can cause unexpected downtime, data loss in volatile caches, and require system reboots, affecting availability and operational continuity. While there is no indication of privilege escalation or remote code execution, the denial of service impact can be significant for service providers, financial institutions, and critical infrastructure operators in Europe. Additionally, the complexity of the vulnerability may delay patch adoption, prolonging exposure. Given the widespread use of Linux in European IT environments, the vulnerability could affect a broad range of sectors including telecommunications, manufacturing, and government services.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the fix for CVE-2025-37759. Specifically, applying the patch that ensures request references are properly grabbed during abort and recovery operations in the ublk driver is critical. System administrators should audit their kernel versions and confirm whether the vulnerable commit is present. For environments using io_uring and zero-copy buffers, additional monitoring for kernel panics and abnormal system reboots should be implemented to detect exploitation attempts. Where immediate patching is not feasible, organizations can consider temporarily disabling or limiting the use of ublk and io_uring features if operationally possible, to reduce exposure. Furthermore, implementing robust system monitoring and alerting for kernel oops and panics will aid in early detection. Coordination with Linux distribution vendors for timely patch releases and applying vendor-specific security advisories is recommended. Finally, testing patches in staging environments before deployment can prevent unintended disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2025-37759: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ublk: fix handling recovery & reissue in ublk_abort_queue() Commit 8284066946e6 ("ublk: grab request reference when the request is handled by userspace") doesn't grab request reference in case of recovery reissue. Then the request can be requeued & re-dispatch & failed when canceling uring command. If it is one zc request, the request can be freed before io_uring returns the zc buffer back, then cause kernel panic: [ 126.773061] BUG: kernel NULL pointer dereference, address: 00000000000000c8 [ 126.773657] #PF: supervisor read access in kernel mode [ 126.774052] #PF: error_code(0x0000) - not-present page [ 126.774455] PGD 0 P4D 0 [ 126.774698] Oops: Oops: 0000 [#1] SMP NOPTI [ 126.775034] CPU: 13 UID: 0 PID: 1612 Comm: kworker/u64:55 Not tainted 6.14.0_blk+ #182 PREEMPT(full) [ 126.775676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39 04/01/2014 [ 126.776275] Workqueue: iou_exit io_ring_exit_work [ 126.776651] RIP: 0010:ublk_io_release+0x14/0x130 [ublk_drv] Fixes it by always grabbing request reference for aborting the request.
AI-Powered Analysis
Technical Analysis
CVE-2025-37759 is a vulnerability identified in the Linux kernel's ublk (userspace block driver) subsystem. The issue stems from improper handling of request references during recovery and reissue operations within the ublk_abort_queue() function. Specifically, a commit (8284066946e6) intended to improve request reference management failed to grab a request reference when a request was reissued as part of recovery. This flaw allows a request to be requeued, redispatched, and potentially fail during cancellation. In scenarios involving zero-copy (zc) requests, this can lead to the request being freed prematurely before io_uring returns the zero-copy buffer, causing a kernel NULL pointer dereference and subsequent kernel panic. The kernel panic manifests as a supervisor read access fault at a null pointer offset, resulting in system instability and potential denial of service. The vulnerability is addressed by ensuring that the request reference is always grabbed when aborting a request, preventing premature freeing and use-after-free conditions. This vulnerability affects Linux kernel versions containing the specified commit and is relevant to systems utilizing the ublk driver and io_uring interface for high-performance asynchronous I/O operations. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to servers and infrastructure running affected Linux kernel versions with ublk and io_uring enabled. The impact includes potential denial of service through kernel panics, which can disrupt critical services, especially in data centers, cloud environments, and enterprise servers relying on Linux for storage and I/O operations. Systems handling high volumes of asynchronous I/O or leveraging zero-copy buffers are particularly vulnerable. The kernel panic can cause unexpected downtime, data loss in volatile caches, and require system reboots, affecting availability and operational continuity. While there is no indication of privilege escalation or remote code execution, the denial of service impact can be significant for service providers, financial institutions, and critical infrastructure operators in Europe. Additionally, the complexity of the vulnerability may delay patch adoption, prolonging exposure. Given the widespread use of Linux in European IT environments, the vulnerability could affect a broad range of sectors including telecommunications, manufacturing, and government services.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the fix for CVE-2025-37759. Specifically, applying the patch that ensures request references are properly grabbed during abort and recovery operations in the ublk driver is critical. System administrators should audit their kernel versions and confirm whether the vulnerable commit is present. For environments using io_uring and zero-copy buffers, additional monitoring for kernel panics and abnormal system reboots should be implemented to detect exploitation attempts. Where immediate patching is not feasible, organizations can consider temporarily disabling or limiting the use of ublk and io_uring features if operationally possible, to reduce exposure. Furthermore, implementing robust system monitoring and alerting for kernel oops and panics will aid in early detection. Coordination with Linux distribution vendors for timely patch releases and applying vendor-specific security advisories is recommended. Finally, testing patches in staging environments before deployment can prevent unintended disruptions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.938Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe836b
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 7/3/2025, 10:43:01 PM
Last updated: 7/29/2025, 6:32:19 AM
Views: 11
Related Threats
CVE-2025-8964: Improper Authentication in code-projects Hostel Management System
MediumCVE-2025-7971: CWE-20: Improper Input Validation in Rockwell Automation Studio 5000 Logix Designer®
HighCVE-2025-40758: CWE-347: Improper Verification of Cryptographic Signature in Siemens Mendix SAML (Mendix 10.12 compatible)
HighCVE-2025-36613: CWE-266: Incorrect Privilege Assignment in Dell SupportAssist for Home PCs
LowCVE-2025-27845: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.