๐Ÿ” CVE Alert

CVE-2025-37838

HIGH 7.8

HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work. If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows: CPU0 CPU1 | ssip_xmit_work ssi_protocol_remove | kfree(ssi); | | struct hsi_client *cl = ssi->cl; | // use ssi Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
df26d639e2f4628732a8da5a0f71e4e652ce809b < d03abc1c2b21324550fa71e12d53e7d3498e0af6 df26d639e2f4628732a8da5a0f71e4e652ce809b < 4a8c29beb8a02b5a0a9d77d608aa14b6f88a6b86 df26d639e2f4628732a8da5a0f71e4e652ce809b < 72972552d0d0bfeb2dec5daf343a19018db36ffa df26d639e2f4628732a8da5a0f71e4e652ce809b < d58493832e284f066e559b8da5ab20c15a2801d3 df26d639e2f4628732a8da5a0f71e4e652ce809b < 58eb29dba712ab0f13af59ca2fe545f5ce360e78 df26d639e2f4628732a8da5a0f71e4e652ce809b < ae5a6a0b425e8f76a9f0677e50796e494e89b088 df26d639e2f4628732a8da5a0f71e4e652ce809b < 834e602d0cc7c743bfce734fad4a46cefc0f9ab1 df26d639e2f4628732a8da5a0f71e4e652ce809b < 4b4194c9a7a8f92db39e8e86c85f4fb12ebbec4f df26d639e2f4628732a8da5a0f71e4e652ce809b < e3f88665a78045fe35c7669d2926b8d97b892c11
Linux / Linux
4.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d03abc1c2b21324550fa71e12d53e7d3498e0af6 git.kernel.org: https://git.kernel.org/stable/c/4a8c29beb8a02b5a0a9d77d608aa14b6f88a6b86 git.kernel.org: https://git.kernel.org/stable/c/72972552d0d0bfeb2dec5daf343a19018db36ffa git.kernel.org: https://git.kernel.org/stable/c/d58493832e284f066e559b8da5ab20c15a2801d3 git.kernel.org: https://git.kernel.org/stable/c/58eb29dba712ab0f13af59ca2fe545f5ce360e78 git.kernel.org: https://git.kernel.org/stable/c/ae5a6a0b425e8f76a9f0677e50796e494e89b088 git.kernel.org: https://git.kernel.org/stable/c/834e602d0cc7c743bfce734fad4a46cefc0f9ab1 git.kernel.org: https://git.kernel.org/stable/c/4b4194c9a7a8f92db39e8e86c85f4fb12ebbec4f git.kernel.org: https://git.kernel.org/stable/c/e3f88665a78045fe35c7669d2926b8d97b892c11 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html