CVE-2025-37946

7.8 HIGH

📋 TL;DR

A double-free vulnerability in the Linux kernel's s390 PCI subsystem could lead to use-after-free conditions when disabling PCI slots with child virtual functions. This affects Linux systems running on IBM Z/s390 architecture with PCI passthrough enabled. Attackers could potentially crash the kernel or execute arbitrary code with kernel privileges.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions containing commit bcb5d6c76903 up to fixes in stable releases
Operating Systems: Linux distributions running on IBM Z/s390 architecture
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when running on s390 architecture with PCI passthrough enabled and using virtual functions (VFs). Most x86_64 and ARM systems are unaffected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or privilege escalation allowing full system compromise via arbitrary code execution in kernel context.

🟠

Likely Case

System instability, kernel crashes, or denial of service affecting PCI device functionality on s390 systems.

🟢

If Mitigated

Limited impact if systems don't use PCI passthrough or aren't on s390 architecture; proper access controls limit exploitation vectors.

🌐 Internet-Facing: LOW - Requires local access or compromised user account; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local attackers or compromised accounts could exploit this to escalate privileges or cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires local access and specific s390 PCI configuration. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in stable kernel releases via commits 05a2538f2b48500cf4e8a0a0ce76623cc5bafcf1, 957529baef142d95e0d1b1bea786675bd47dbe53, c488f8b53e156d6dcc0514ef0afa3a33376b8f9e

Vendor Advisory: https://git.kernel.org/stable/c/05a2538f2b48500cf4e8a0a0ce76623cc5bafcf1

Restart Required: Yes

Instructions:

1. Update to latest stable kernel version from your distribution. 2. For s390 systems: ensure kernel includes fix commits. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable PCI passthrough

linux

Prevent use of PCI virtual functions on s390 systems

echo 0 > /sys/bus/pci/devices/*/sriov_numvfs

🧯 If You Can't Patch

  • Restrict local user access to systems with s390 PCI configuration
  • Monitor for kernel panic logs and system instability on s390 systems

🔍 How to Verify

Check if Vulnerable:

Check kernel version and architecture: uname -r and uname -m. If s390 architecture and kernel version between affected commits, system may be vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits: grep -q '05a2538f2b48500cf4e8a0a0ce76623cc5bafcf1\|957529baef142d95e0d1b1bea786675bd47dbe53\|c488f8b53e156d6dcc0514ef0afa3a33376b8f9e' /proc/version

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • PCI subsystem errors in dmesg
  • Use-after-free warnings in kernel logs

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("panic" OR "use-after-free" OR "pci_dev_put")

🔗 References

📤 Share & Export