CVE-2025-37995 (GCVE-0-2025-37995)
Vulnerability from cvelistv5
Published
2025-05-29 13:15
Modified
2025-06-04 12:57
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: module: ensure that kobject_put() is safe for module type kobjects In 'lookup_or_create_module_kobject()', an internal kobject is created using 'module_ktype'. So call to 'kobject_put()' on error handling path causes an attempt to use an uninitialized completion pointer in 'module_kobject_release()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.
Impacted products
Vendor Product Version
Linux Linux Version: 942e443127e928a5631c3d5102aca8c8b3c2dd98
Version: 942e443127e928a5631c3d5102aca8c8b3c2dd98
Version: 942e443127e928a5631c3d5102aca8c8b3c2dd98
Version: 942e443127e928a5631c3d5102aca8c8b3c2dd98
Version: 942e443127e928a5631c3d5102aca8c8b3c2dd98
Version: 942e443127e928a5631c3d5102aca8c8b3c2dd98
Version: 942e443127e928a5631c3d5102aca8c8b3c2dd98
Version: 942e443127e928a5631c3d5102aca8c8b3c2dd98
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "kernel/params.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "93799fb988757cdacf19acba57807746c00378e6",
              "status": "affected",
              "version": "942e443127e928a5631c3d5102aca8c8b3c2dd98",
              "versionType": "git"
            },
            {
              "lessThan": "a63d99873547d8b39eb2f6db79dd235761e7098a",
              "status": "affected",
              "version": "942e443127e928a5631c3d5102aca8c8b3c2dd98",
              "versionType": "git"
            },
            {
              "lessThan": "f1c71b4bd721a4ea21da408806964b10468623f2",
              "status": "affected",
              "version": "942e443127e928a5631c3d5102aca8c8b3c2dd98",
              "versionType": "git"
            },
            {
              "lessThan": "9e7b49ce4f9d0cb5b6e87db9e07a2fb9e754b0dd",
              "status": "affected",
              "version": "942e443127e928a5631c3d5102aca8c8b3c2dd98",
              "versionType": "git"
            },
            {
              "lessThan": "faa9059631d3491d699c69ecf512de9e1a3d6649",
              "status": "affected",
              "version": "942e443127e928a5631c3d5102aca8c8b3c2dd98",
              "versionType": "git"
            },
            {
              "lessThan": "d63851049f412cdfadaeef7a7eaef5031d11c1e9",
              "status": "affected",
              "version": "942e443127e928a5631c3d5102aca8c8b3c2dd98",
              "versionType": "git"
            },
            {
              "lessThan": "31d8df3f303c3ae9115230820977ef8c35c88808",
              "status": "affected",
              "version": "942e443127e928a5631c3d5102aca8c8b3c2dd98",
              "versionType": "git"
            },
            {
              "lessThan": "a6aeb739974ec73e5217c75a7c008a688d3d5cf1",
              "status": "affected",
              "version": "942e443127e928a5631c3d5102aca8c8b3c2dd98",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "kernel/params.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.12"
            },
            {
              "lessThan": "3.12",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.294",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.238",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.183",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.139",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.91",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.29",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.14.*",
              "status": "unaffected",
              "version": "6.14.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.15",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.294",
                  "versionStartIncluding": "3.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.238",
                  "versionStartIncluding": "3.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.183",
                  "versionStartIncluding": "3.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.139",
                  "versionStartIncluding": "3.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.91",
                  "versionStartIncluding": "3.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.29",
                  "versionStartIncluding": "3.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14.7",
                  "versionStartIncluding": "3.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15",
                  "versionStartIncluding": "3.12",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmodule: ensure that kobject_put() is safe for module type kobjects\n\nIn \u0027lookup_or_create_module_kobject()\u0027, an internal kobject is created\nusing \u0027module_ktype\u0027. So call to \u0027kobject_put()\u0027 on error handling\npath causes an attempt to use an uninitialized completion pointer in\n\u0027module_kobject_release()\u0027. In this scenario, we just want to release\nkobject without an extra synchronization required for a regular module\nunloading process, so adding an extra check whether \u0027complete()\u0027 is\nactually required makes \u0027kobject_put()\u0027 safe."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-04T12:57:43.549Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/93799fb988757cdacf19acba57807746c00378e6"
        },
        {
          "url": "https://git.kernel.org/stable/c/a63d99873547d8b39eb2f6db79dd235761e7098a"
        },
        {
          "url": "https://git.kernel.org/stable/c/f1c71b4bd721a4ea21da408806964b10468623f2"
        },
        {
          "url": "https://git.kernel.org/stable/c/9e7b49ce4f9d0cb5b6e87db9e07a2fb9e754b0dd"
        },
        {
          "url": "https://git.kernel.org/stable/c/faa9059631d3491d699c69ecf512de9e1a3d6649"
        },
        {
          "url": "https://git.kernel.org/stable/c/d63851049f412cdfadaeef7a7eaef5031d11c1e9"
        },
        {
          "url": "https://git.kernel.org/stable/c/31d8df3f303c3ae9115230820977ef8c35c88808"
        },
        {
          "url": "https://git.kernel.org/stable/c/a6aeb739974ec73e5217c75a7c008a688d3d5cf1"
        }
      ],
      "title": "module: ensure that kobject_put() is safe for module type kobjects",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-37995",
    "datePublished": "2025-05-29T13:15:54.095Z",
    "dateReserved": "2025-04-16T04:51:23.976Z",
    "dateUpdated": "2025-06-04T12:57:43.549Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-37995\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-05-29T14:15:36.043\",\"lastModified\":\"2025-06-04T13:15:28.403\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmodule: ensure that kobject_put() is safe for module type kobjects\\n\\nIn \u0027lookup_or_create_module_kobject()\u0027, an internal kobject is created\\nusing \u0027module_ktype\u0027. So call to \u0027kobject_put()\u0027 on error handling\\npath causes an attempt to use an uninitialized completion pointer in\\n\u0027module_kobject_release()\u0027. In this scenario, we just want to release\\nkobject without an extra synchronization required for a regular module\\nunloading process, so adding an extra check whether \u0027complete()\u0027 is\\nactually required makes \u0027kobject_put()\u0027 safe.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: m\u00f3dulo: garantizar que kobject_put() sea seguro para el tipo de m\u00f3dulo kobjects. En \u0027lookup_or_create_module_kobject()\u0027, se crea un kobject interno mediante \u0027module_ktype\u0027. Por lo tanto, la llamada a \u0027kobject_put()\u0027 en la ruta de gesti\u00f3n de errores provoca un intento de usar un puntero de finalizaci\u00f3n no inicializado en \u0027module_kobject_release()\u0027. En este escenario, solo queremos liberar kobject sin una sincronizaci\u00f3n adicional requerida para un proceso de descarga de m\u00f3dulo normal, por lo que a\u00f1adir una comprobaci\u00f3n adicional si \u0027complete()\u0027 es realmente necesario hace que \u0027kobject_put()\u0027 sea seguro.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/31d8df3f303c3ae9115230820977ef8c35c88808\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/93799fb988757cdacf19acba57807746c00378e6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9e7b49ce4f9d0cb5b6e87db9e07a2fb9e754b0dd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a63d99873547d8b39eb2f6db79dd235761e7098a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a6aeb739974ec73e5217c75a7c008a688d3d5cf1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d63851049f412cdfadaeef7a7eaef5031d11c1e9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f1c71b4bd721a4ea21da408806964b10468623f2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/faa9059631d3491d699c69ecf512de9e1a3d6649\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…