Skip to main content

CVE-2025-37846: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-37846cvecve-2025-37846
Published: Fri May 09 2025 (05/09/2025, 06:41:54 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: arm64: mops: Do not dereference src reg for a set operation The source register is not used for SET* and reading it can result in a UBSAN out-of-bounds array access error, specifically when the MOPS exception is taken from a SET* sequence with XZR (reg 31) as the source. Architecturally this is the only case where a src/dst/size field in the ESR can be reported as 31. Prior to 2de451a329cf662b the code in do_el0_mops() was benign as the use of pt_regs_read_reg() prevented the out-of-bounds access.

AI-Powered Analysis

AILast updated: 07/04/2025, 00:25:26 UTC

Technical Analysis

CVE-2025-37846 is a vulnerability identified in the Linux kernel specifically affecting the ARM64 architecture's MOPS (Memory Operations) exception handling code. The issue arises from improper handling of the source register during a SET* operation within the kernel's exception processing routine do_el0_mops(). In this context, the source register (src reg) should not be dereferenced for SET* operations because it is architecturally unused and can be reported as register 31 (XZR), which is the zero register in ARM64. Dereferencing this register leads to an out-of-bounds array access error detected by the Undefined Behavior Sanitizer (UBSAN). Prior to the patch identified by commit 2de451a329cf662b, the code used pt_regs_read_reg(), which prevented this out-of-bounds access, but changes introduced a regression causing the vulnerability. Although this vulnerability does not appear to have known exploits in the wild and lacks a CVSS score, it represents a potential stability and security risk in ARM64 Linux kernel environments. The flaw could cause kernel crashes or undefined behavior when the MOPS exception is triggered with a SET* sequence involving the zero register, potentially leading to denial of service or other unpredictable kernel-level faults. This vulnerability is relevant for Linux kernel versions containing the specified commit and affects systems running ARM64 processors, which are increasingly common in servers, embedded devices, and cloud infrastructure. The vulnerability is subtle and requires specific conditions to trigger, but it highlights the importance of careful register handling in low-level kernel exception code.

Potential Impact

For European organizations, the impact of CVE-2025-37846 primarily concerns systems running Linux on ARM64 architectures, including servers, cloud infrastructure, and embedded devices. While no active exploits are known, the vulnerability could lead to kernel crashes or instability, resulting in denial of service conditions. This can disrupt critical services, especially in sectors relying on ARM64-based Linux systems such as telecommunications, cloud providers, and IoT deployments. Confidentiality and integrity impacts appear limited as the vulnerability relates to out-of-bounds reads rather than direct memory corruption or privilege escalation. However, availability could be significantly affected if attackers or faulty software trigger the MOPS exception with the problematic SET* sequence, causing system crashes or reboots. European organizations using ARM64 Linux kernels in production environments should be aware of potential service disruptions and the need for timely patching. The vulnerability also underscores the importance of rigorous kernel testing and monitoring for unusual exception conditions that could indicate exploitation attempts or stability issues.

Mitigation Recommendations

To mitigate CVE-2025-37846, European organizations should: 1) Identify all Linux systems running on ARM64 architectures, including servers, embedded devices, and cloud instances. 2) Track Linux kernel versions and apply the patch containing commit 2de451a329cf662b or later updates that address this vulnerability as soon as they become available. 3) Implement kernel-level monitoring to detect unusual MOPS exceptions or kernel faults that could indicate attempts to trigger this vulnerability. 4) For critical systems where immediate patching is not feasible, consider deploying kernel live patching solutions that can apply fixes without rebooting. 5) Engage with Linux distribution vendors and cloud providers to confirm patch availability and deployment timelines. 6) Conduct thorough regression testing after patch application to ensure system stability, given the subtle nature of the vulnerability. 7) Review and harden exception handling and kernel debugging configurations to facilitate rapid detection and response to related faults. These steps go beyond generic advice by focusing on ARM64-specific environments and emphasizing proactive monitoring and patch management tailored to kernel exception handling.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.953Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd7c82

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/4/2025, 12:25:26 AM

Last updated: 8/7/2025, 3:40:43 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats