๐Ÿ” CVE Alert

CVE-2025-37995

UNKNOWN 0.0

module: ensure that kobject_put() is safe for module type kobjects

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: module: ensure that kobject_put() is safe for module type kobjects In 'lookup_or_create_module_kobject()', an internal kobject is created using 'module_ktype'. So call to 'kobject_put()' on error handling path causes an attempt to use an uninitialized completion pointer in 'module_kobject_release()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 29, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
942e443127e928a5631c3d5102aca8c8b3c2dd98 < 93799fb988757cdacf19acba57807746c00378e6 942e443127e928a5631c3d5102aca8c8b3c2dd98 < a63d99873547d8b39eb2f6db79dd235761e7098a 942e443127e928a5631c3d5102aca8c8b3c2dd98 < f1c71b4bd721a4ea21da408806964b10468623f2 942e443127e928a5631c3d5102aca8c8b3c2dd98 < 9e7b49ce4f9d0cb5b6e87db9e07a2fb9e754b0dd 942e443127e928a5631c3d5102aca8c8b3c2dd98 < faa9059631d3491d699c69ecf512de9e1a3d6649 942e443127e928a5631c3d5102aca8c8b3c2dd98 < d63851049f412cdfadaeef7a7eaef5031d11c1e9 942e443127e928a5631c3d5102aca8c8b3c2dd98 < 31d8df3f303c3ae9115230820977ef8c35c88808 942e443127e928a5631c3d5102aca8c8b3c2dd98 < a6aeb739974ec73e5217c75a7c008a688d3d5cf1
Linux / Linux
3.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/93799fb988757cdacf19acba57807746c00378e6 git.kernel.org: https://git.kernel.org/stable/c/a63d99873547d8b39eb2f6db79dd235761e7098a git.kernel.org: https://git.kernel.org/stable/c/f1c71b4bd721a4ea21da408806964b10468623f2 git.kernel.org: https://git.kernel.org/stable/c/9e7b49ce4f9d0cb5b6e87db9e07a2fb9e754b0dd git.kernel.org: https://git.kernel.org/stable/c/faa9059631d3491d699c69ecf512de9e1a3d6649 git.kernel.org: https://git.kernel.org/stable/c/d63851049f412cdfadaeef7a7eaef5031d11c1e9 git.kernel.org: https://git.kernel.org/stable/c/31d8df3f303c3ae9115230820977ef8c35c88808 git.kernel.org: https://git.kernel.org/stable/c/a6aeb739974ec73e5217c75a7c008a688d3d5cf1 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html