Skip to main content

CVE-2025-37845: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-37845cvecve-2025-37845
Published: Fri May 09 2025 (05/09/2025, 06:41:54 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: tracing: fprobe events: Fix possible UAF on modules Commit ac91052f0ae5 ("tracing: tprobe-events: Fix leakage of module refcount") moved try_module_get() from __find_tracepoint_module_cb() to find_tracepoint() caller, but that introduced a possible UAF because the module can be unloaded before try_module_get(). In this case, the module object should be freed too. Thus, try_module_get() does not only fail but may access to the freed object. To avoid that, try_module_get() in __find_tracepoint_module_cb() again.

AI-Powered Analysis

AILast updated: 07/04/2025, 00:25:06 UTC

Technical Analysis

CVE-2025-37845 is a use-after-free (UAF) vulnerability identified in the Linux kernel's tracing subsystem, specifically related to fprobe and tprobe events. The vulnerability arises from a flawed handling of module reference counting during tracepoint module lookups. A recent code change (commit ac91052f0ae5) moved the try_module_get() call from the __find_tracepoint_module_cb() callback function to the caller of find_tracepoint(). This change inadvertently introduced a race condition where the kernel might access a module object after it has been freed, because the module can be unloaded before try_module_get() is called. The intended fix is to revert try_module_get() back into the callback to ensure the module reference count is properly incremented before any access, preventing the use of freed memory. This vulnerability could lead to kernel memory corruption, potentially allowing local attackers to execute arbitrary code with kernel privileges, cause system crashes, or escalate privileges. The affected versions are specific Linux kernel commits prior to the fix, indicating that this is a recent regression in kernel tracing code. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those running Linux-based infrastructure, including servers, cloud environments, and embedded systems. Exploitation could allow attackers with local access to execute arbitrary code in kernel space, leading to full system compromise, data breaches, or denial of service. Critical infrastructure operators, financial institutions, and enterprises relying on Linux for their backend systems could face operational disruptions and data integrity issues. Moreover, since the vulnerability involves kernel tracing modules, environments that utilize advanced debugging or monitoring tools may be particularly exposed. The absence of known exploits currently reduces immediate risk, but the potential for future weaponization means organizations should prioritize patching. Given the widespread use of Linux in Europe across public and private sectors, the impact could be broad if exploited.

Mitigation Recommendations

Organizations should promptly update their Linux kernels to versions containing the fix that reintroduces try_module_get() within the __find_tracepoint_module_cb() function to prevent the use-after-free condition. Since this is a kernel-level vulnerability, applying vendor-supplied kernel patches or upgrading to the latest stable kernel release is critical. For environments where immediate patching is not feasible, disabling kernel tracing features such as fprobe and tprobe events can reduce exposure. Additionally, restricting local user access to trusted personnel and enforcing strict privilege separation can mitigate exploitation risk. Monitoring kernel logs for unusual tracepoint activity and employing runtime security tools capable of detecting anomalous kernel behavior may provide early warning. Finally, organizations should maintain robust backup and recovery procedures to minimize impact in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.953Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd7c71

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/4/2025, 12:25:06 AM

Last updated: 7/25/2025, 12:58:57 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats