Use After Free Vulnerability in Linux Kernel's ssi_protocol Driver
CVE-2025-37838

7.8HIGH

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
18 April 2025

What is CVE-2025-37838?

The Linux kernel's ssi_protocol driver is susceptible to a use after free vulnerability caused by a race condition between the cleanup process and the execution of a work function. In particular, when the ssi_protocol_remove() function is invoked, it frees a memory structure (ssi) while another process may still reference it. This can result in unpredictable behavior or potential exploitation. The issue has been addressed by ensuring that any ongoing work is canceled prior to executing the cleanup process, thereby preserving system integrity.

Affected Version(s)

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 4a8c29beb8a02b5a0a9d77d608aa14b6f88a6b86

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 72972552d0d0bfeb2dec5daf343a19018db36ffa

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.
CVE-2025-37838 : Use After Free Vulnerability in Linux Kernel's ssi_protocol Driver