CVE-2025-37845: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: tracing: fprobe events: Fix possible UAF on modules Commit ac91052f0ae5 ("tracing: tprobe-events: Fix leakage of module refcount") moved try_module_get() from __find_tracepoint_module_cb() to find_tracepoint() caller, but that introduced a possible UAF because the module can be unloaded before try_module_get(). In this case, the module object should be freed too. Thus, try_module_get() does not only fail but may access to the freed object. To avoid that, try_module_get() in __find_tracepoint_module_cb() again.
AI Analysis
Technical Summary
CVE-2025-37845 is a use-after-free (UAF) vulnerability identified in the Linux kernel's tracing subsystem, specifically related to fprobe and tprobe events. The vulnerability arises from a flawed handling of module reference counting during tracepoint module lookups. A recent code change (commit ac91052f0ae5) moved the try_module_get() call from the __find_tracepoint_module_cb() callback function to the caller of find_tracepoint(). This change inadvertently introduced a race condition where the kernel might access a module object after it has been freed, because the module can be unloaded before try_module_get() is called. The intended fix is to revert try_module_get() back into the callback to ensure the module reference count is properly incremented before any access, preventing the use of freed memory. This vulnerability could lead to kernel memory corruption, potentially allowing local attackers to execute arbitrary code with kernel privileges, cause system crashes, or escalate privileges. The affected versions are specific Linux kernel commits prior to the fix, indicating that this is a recent regression in kernel tracing code. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those running Linux-based infrastructure, including servers, cloud environments, and embedded systems. Exploitation could allow attackers with local access to execute arbitrary code in kernel space, leading to full system compromise, data breaches, or denial of service. Critical infrastructure operators, financial institutions, and enterprises relying on Linux for their backend systems could face operational disruptions and data integrity issues. Moreover, since the vulnerability involves kernel tracing modules, environments that utilize advanced debugging or monitoring tools may be particularly exposed. The absence of known exploits currently reduces immediate risk, but the potential for future weaponization means organizations should prioritize patching. Given the widespread use of Linux in Europe across public and private sectors, the impact could be broad if exploited.
Mitigation Recommendations
Organizations should promptly update their Linux kernels to versions containing the fix that reintroduces try_module_get() within the __find_tracepoint_module_cb() function to prevent the use-after-free condition. Since this is a kernel-level vulnerability, applying vendor-supplied kernel patches or upgrading to the latest stable kernel release is critical. For environments where immediate patching is not feasible, disabling kernel tracing features such as fprobe and tprobe events can reduce exposure. Additionally, restricting local user access to trusted personnel and enforcing strict privilege separation can mitigate exploitation risk. Monitoring kernel logs for unusual tracepoint activity and employing runtime security tools capable of detecting anomalous kernel behavior may provide early warning. Finally, organizations should maintain robust backup and recovery procedures to minimize impact in case of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Finland
CVE-2025-37845: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: tracing: fprobe events: Fix possible UAF on modules Commit ac91052f0ae5 ("tracing: tprobe-events: Fix leakage of module refcount") moved try_module_get() from __find_tracepoint_module_cb() to find_tracepoint() caller, but that introduced a possible UAF because the module can be unloaded before try_module_get(). In this case, the module object should be freed too. Thus, try_module_get() does not only fail but may access to the freed object. To avoid that, try_module_get() in __find_tracepoint_module_cb() again.
AI-Powered Analysis
Technical Analysis
CVE-2025-37845 is a use-after-free (UAF) vulnerability identified in the Linux kernel's tracing subsystem, specifically related to fprobe and tprobe events. The vulnerability arises from a flawed handling of module reference counting during tracepoint module lookups. A recent code change (commit ac91052f0ae5) moved the try_module_get() call from the __find_tracepoint_module_cb() callback function to the caller of find_tracepoint(). This change inadvertently introduced a race condition where the kernel might access a module object after it has been freed, because the module can be unloaded before try_module_get() is called. The intended fix is to revert try_module_get() back into the callback to ensure the module reference count is properly incremented before any access, preventing the use of freed memory. This vulnerability could lead to kernel memory corruption, potentially allowing local attackers to execute arbitrary code with kernel privileges, cause system crashes, or escalate privileges. The affected versions are specific Linux kernel commits prior to the fix, indicating that this is a recent regression in kernel tracing code. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those running Linux-based infrastructure, including servers, cloud environments, and embedded systems. Exploitation could allow attackers with local access to execute arbitrary code in kernel space, leading to full system compromise, data breaches, or denial of service. Critical infrastructure operators, financial institutions, and enterprises relying on Linux for their backend systems could face operational disruptions and data integrity issues. Moreover, since the vulnerability involves kernel tracing modules, environments that utilize advanced debugging or monitoring tools may be particularly exposed. The absence of known exploits currently reduces immediate risk, but the potential for future weaponization means organizations should prioritize patching. Given the widespread use of Linux in Europe across public and private sectors, the impact could be broad if exploited.
Mitigation Recommendations
Organizations should promptly update their Linux kernels to versions containing the fix that reintroduces try_module_get() within the __find_tracepoint_module_cb() function to prevent the use-after-free condition. Since this is a kernel-level vulnerability, applying vendor-supplied kernel patches or upgrading to the latest stable kernel release is critical. For environments where immediate patching is not feasible, disabling kernel tracing features such as fprobe and tprobe events can reduce exposure. Additionally, restricting local user access to trusted personnel and enforcing strict privilege separation can mitigate exploitation risk. Monitoring kernel logs for unusual tracepoint activity and employing runtime security tools capable of detecting anomalous kernel behavior may provide early warning. Finally, organizations should maintain robust backup and recovery procedures to minimize impact in case of exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.953Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd7c71
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/4/2025, 12:25:06 AM
Last updated: 7/25/2025, 12:58:57 PM
Views: 11
Related Threats
CVE-2025-8838: Improper Authentication in WinterChenS my-site
MediumCVE-2025-8837: Use After Free in JasPer
MediumCVE-2025-8661: Vulnerability in Broadcom Symantec PGP Encryption
MediumCVE-2025-8836: Reachable Assertion in JasPer
MediumCVE-2025-8747: CWE-502 Deserialization of Untrusted Data in Google Keras
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.