• CVE-2025-37995

发布时间: 2025年6月13日

修改时间: 2025年6月13日

概要

In the Linux kernel, the following vulnerability has been resolved: module: ensure that kobject_put() is safe for module type kobjects In 'lookup_or_create_module_kobject()', an internal kobject is created using 'module_ktype'. So call to 'kobject_put()' on error handling path causes an attempt to use an uninitialized completion pointer in 'module_kobject_release()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.

CVSS v3 指标

NVD openEuler
Confidentiality High
Attack Vector Local
CVSS评分 N/A 7.0
Attack Complexity High
Privileges Required Low
Scope Unchanged
Integrity High
User Interaction None
Availability High

安全公告

公告名 概要 发布时间
KylinSec-SA-2025-2776 kernel security update 2025年7月13日

影响产品

产品 状态
KY3.4-5A kernel Fixed
V6 kernel Fixed
KY3.5.3 kernel Fixed
KY3.5.2 kernel Fixed