CVE-2025-37838

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-37838
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37838.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37838
Downstream
Published
2025-04-18T15:15:59Z
Modified
2025-08-09T20:01:27Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

HSI: ssiprotocol: Fix use after free vulnerability in ssiprotocol Driver Due to Race Condition

In the ssiprotocolprobe() function, &ssi->work is bound with ssipxmitwork(), In ssippnsetup(), the ssippnxmit() function within the ssippnops structure is capable of starting the work.

If we remove the module which will call ssiprotocolremove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:

CPU0 CPU1

                    | ssip_xmit_work

ssiprotocolremove | kfree(ssi); | | struct hsi_client *cl = ssi->cl; | // use ssi

Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssiprotocolremove().

References

Affected packages