Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-37838— HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition

EPSS 0.06% · P18

Affected Version Matrix 20

VendorProductVersion RangeStatus
LinuxLinuxdf26d639e2f4628732a8da5a0f71e4e652ce809b< d03abc1c2b21324550fa71e12d53e7d3498e0af6affected
df26d639e2f4628732a8da5a0f71e4e652ce809b< 4a8c29beb8a02b5a0a9d77d608aa14b6f88a6b86affected
df26d639e2f4628732a8da5a0f71e4e652ce809b< 72972552d0d0bfeb2dec5daf343a19018db36ffaaffected
df26d639e2f4628732a8da5a0f71e4e652ce809b< d58493832e284f066e559b8da5ab20c15a2801d3affected
df26d639e2f4628732a8da5a0f71e4e652ce809b< 58eb29dba712ab0f13af59ca2fe545f5ce360e78affected
df26d639e2f4628732a8da5a0f71e4e652ce809b< ae5a6a0b425e8f76a9f0677e50796e494e89b088affected
df26d639e2f4628732a8da5a0f71e4e652ce809b< 834e602d0cc7c743bfce734fad4a46cefc0f9ab1affected
df26d639e2f4628732a8da5a0f71e4e652ce809b< 4b4194c9a7a8f92db39e8e86c85f4fb12ebbec4faffected
… +12 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-37838

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work. If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows: CPU0 CPU1 | ssip_xmit_work ssi_protocol_remove | kfree(ssi); | | struct hsi_client *cl = ssi->cl; | // use ssi Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于ssi_protocol驱动程序中存在释放后重用漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux df26d639e2f4628732a8da5a0f71e4e652ce809b ~ d03abc1c2b21324550fa71e12d53e7d3498e0af6 -
LinuxLinux 4.8 -

II. Public POCs for CVE-2025-37838

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-37838

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-04-18 · 23 CVEs total

CVE-2025-39688nfsd: allow SC_STATUS_FREEABLE when searching via nfs4_lookup_stateid()
CVE-2025-37785ext4: fix OOB read when checking dotdot dir
CVE-2025-37860sfc: fix NULL dereferences in ef100_process_design_param()
CVE-2025-37925jfs: reject on-disk inodes of an unsupported type
CVE-2025-37893LoongArch: BPF: Fix off-by-one error in build_prologue()
CVE-2025-38049x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no monitors
CVE-2025-38104drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversi
CVE-2025-38152remoteproc: core: Clear table_sz when rproc_shutdown
CVE-2025-38240drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr
CVE-2025-38479dmaengine: fsl-edma: free irq correctly in remove path
CVE-2025-38575ksmbd: use aead_request_free to match aead_request_alloc
CVE-2025-40364io_uring: fix io_req_prep_async with provided buffers
CVE-2025-38637net_sched: skbprio: Remove overly strict queue assertions
CVE-2025-39735jfs: fix slab-out-of-bounds read in ea_get()
CVE-2025-39728clk: samsung: Fix UBSAN panic in samsung_clk_init()
CVE-2025-39755staging: gpib: Fix cb7210 pcmcia Oops
CVE-2025-39778objtool, nvmet: Fix out-of-bounds stack access in nvmet_ctrl_state_show()
CVE-2025-39930ASoC: simple-card-utils: Don't use __free(device_node) at graph_util_parse_dai()
CVE-2025-39989x86/mce: use is_copy_from_user() to determine copy-from-user context
CVE-2025-40014objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq()

Showing top 20 of 23 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-37838

No comments yet


Leave a comment