CVE-2025-37819: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() With ACPI in place, gicv2m_get_fwnode() is registered with the pci subsystem as pci_msi_get_fwnode_cb(), which may get invoked at runtime during a PCI host bridge probe. But, the call back is wrongly marked as __init, causing it to be freed, while being registered with the PCI subsystem and could trigger: Unable to handle kernel paging request at virtual address ffff8000816c0400 gicv2m_get_fwnode+0x0/0x58 (P) pci_set_bus_msi_domain+0x74/0x88 pci_register_host_bridge+0x194/0x548 This is easily reproducible on a Juno board with ACPI boot. Retain the function for later use.
AI Analysis
Technical Summary
CVE-2025-37819 is a vulnerability identified in the Linux kernel specifically affecting the irqchip/gic-v2m driver, which handles Generic Interrupt Controller (GIC) version 2 with MSI (Message Signaled Interrupts) support. The root cause of the vulnerability lies in the improper use of the __init annotation on the function gicv2m_get_fwnode(). This function is registered as a callback (pci_msi_get_fwnode_cb) with the PCI subsystem to be invoked during PCI host bridge probing when ACPI (Advanced Configuration and Power Interface) is enabled. However, marking this callback as __init causes the function's memory to be freed after initialization, even though the PCI subsystem may call it later at runtime. This results in a use-after-free condition, leading to a kernel paging fault when the callback is invoked, causing a potential kernel crash or denial of service. The issue is reproducible on hardware platforms such as the Juno board with ACPI boot enabled. The vulnerability arises from a lifecycle management bug in kernel memory handling and callback registration, which can destabilize the system kernel and potentially be exploited to disrupt system availability or cause unpredictable behavior. No known exploits are reported in the wild as of the publication date. The vulnerability affects Linux kernel versions containing the specified commit hashes and requires patching to retain the function beyond initialization to prevent premature freeing.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with ACPI enabled and using the GIC v2 MSI interrupt controller, which is common in ARM-based platforms and embedded systems. The impact is mainly on system availability due to kernel crashes triggered by the use-after-free bug. Critical infrastructure, industrial control systems, telecommunications equipment, and embedded devices using Linux kernels with these configurations could experience unexpected downtime or instability. Although no remote code execution or privilege escalation is directly indicated, denial of service conditions in kernel space can disrupt business operations, especially in sectors relying on ARM-based Linux devices. Organizations using Linux servers or devices with affected kernels should be aware that this vulnerability could be triggered during PCI host bridge probing, potentially during hardware initialization or runtime device enumeration, leading to system crashes. This may affect cloud providers, telecom operators, and enterprises deploying ARM-based Linux systems in Europe. The lack of known exploits reduces immediate risk, but the vulnerability's presence in kernel code means that attackers with local access or the ability to trigger PCI probing could exploit it to cause denial of service.
Mitigation Recommendations
1. Apply the official Linux kernel patches that correct the lifecycle management of gicv2m_get_fwnode(), ensuring the function is not marked __init and is retained for runtime use. Monitor Linux kernel mailing lists and vendor advisories for updated kernel releases addressing CVE-2025-37819. 2. For organizations unable to immediately patch, consider disabling ACPI or PCI host bridge probing features if feasible and if it does not impact critical functionality, to reduce the attack surface. 3. Implement strict access controls and monitoring on systems running affected kernels to detect abnormal kernel crashes or PCI subsystem errors that may indicate exploitation attempts. 4. Conduct thorough testing of kernel updates in staging environments, especially on ARM-based platforms like Juno boards or similar hardware, to validate stability and patch effectiveness. 5. Maintain up-to-date inventory of Linux kernel versions in use across the organization, focusing on embedded and ARM-based devices, to prioritize patching efforts. 6. Collaborate with hardware vendors and Linux distribution maintainers to ensure timely deployment of fixed kernel versions and backports for long-term support kernels.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Italy, Spain, Poland
CVE-2025-37819: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() With ACPI in place, gicv2m_get_fwnode() is registered with the pci subsystem as pci_msi_get_fwnode_cb(), which may get invoked at runtime during a PCI host bridge probe. But, the call back is wrongly marked as __init, causing it to be freed, while being registered with the PCI subsystem and could trigger: Unable to handle kernel paging request at virtual address ffff8000816c0400 gicv2m_get_fwnode+0x0/0x58 (P) pci_set_bus_msi_domain+0x74/0x88 pci_register_host_bridge+0x194/0x548 This is easily reproducible on a Juno board with ACPI boot. Retain the function for later use.
AI-Powered Analysis
Technical Analysis
CVE-2025-37819 is a vulnerability identified in the Linux kernel specifically affecting the irqchip/gic-v2m driver, which handles Generic Interrupt Controller (GIC) version 2 with MSI (Message Signaled Interrupts) support. The root cause of the vulnerability lies in the improper use of the __init annotation on the function gicv2m_get_fwnode(). This function is registered as a callback (pci_msi_get_fwnode_cb) with the PCI subsystem to be invoked during PCI host bridge probing when ACPI (Advanced Configuration and Power Interface) is enabled. However, marking this callback as __init causes the function's memory to be freed after initialization, even though the PCI subsystem may call it later at runtime. This results in a use-after-free condition, leading to a kernel paging fault when the callback is invoked, causing a potential kernel crash or denial of service. The issue is reproducible on hardware platforms such as the Juno board with ACPI boot enabled. The vulnerability arises from a lifecycle management bug in kernel memory handling and callback registration, which can destabilize the system kernel and potentially be exploited to disrupt system availability or cause unpredictable behavior. No known exploits are reported in the wild as of the publication date. The vulnerability affects Linux kernel versions containing the specified commit hashes and requires patching to retain the function beyond initialization to prevent premature freeing.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with ACPI enabled and using the GIC v2 MSI interrupt controller, which is common in ARM-based platforms and embedded systems. The impact is mainly on system availability due to kernel crashes triggered by the use-after-free bug. Critical infrastructure, industrial control systems, telecommunications equipment, and embedded devices using Linux kernels with these configurations could experience unexpected downtime or instability. Although no remote code execution or privilege escalation is directly indicated, denial of service conditions in kernel space can disrupt business operations, especially in sectors relying on ARM-based Linux devices. Organizations using Linux servers or devices with affected kernels should be aware that this vulnerability could be triggered during PCI host bridge probing, potentially during hardware initialization or runtime device enumeration, leading to system crashes. This may affect cloud providers, telecom operators, and enterprises deploying ARM-based Linux systems in Europe. The lack of known exploits reduces immediate risk, but the vulnerability's presence in kernel code means that attackers with local access or the ability to trigger PCI probing could exploit it to cause denial of service.
Mitigation Recommendations
1. Apply the official Linux kernel patches that correct the lifecycle management of gicv2m_get_fwnode(), ensuring the function is not marked __init and is retained for runtime use. Monitor Linux kernel mailing lists and vendor advisories for updated kernel releases addressing CVE-2025-37819. 2. For organizations unable to immediately patch, consider disabling ACPI or PCI host bridge probing features if feasible and if it does not impact critical functionality, to reduce the attack surface. 3. Implement strict access controls and monitoring on systems running affected kernels to detect abnormal kernel crashes or PCI subsystem errors that may indicate exploitation attempts. 4. Conduct thorough testing of kernel updates in staging environments, especially on ARM-based platforms like Juno boards or similar hardware, to validate stability and patch effectiveness. 5. Maintain up-to-date inventory of Linux kernel versions in use across the organization, focusing on embedded and ARM-based devices, to prioritize patching efforts. 6. Collaborate with hardware vendors and Linux distribution maintainers to ensure timely deployment of fixed kernel versions and backports for long-term support kernels.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.947Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd7ba9
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/3/2025, 11:54:43 PM
Last updated: 8/8/2025, 6:41:07 AM
Views: 15
Related Threats
CVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumCVE-2025-8929: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-8928: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-34154: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Synergetic Data Systems Inc. UnForm Server Manager
CriticalCVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.