CVE-2025-38346

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's ftrace subsystem that occurs when kallsyms looks up module symbols after ftrace has been disabled. It allows local attackers to potentially crash the kernel or execute arbitrary code. All Linux systems with vulnerable kernel versions and ftrace enabled are affected.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Specific vulnerable versions not explicitly stated, but patches exist for multiple stable branches.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Requires ftrace to be enabled and a buggy module that triggers ftrace_disable. Not all configurations are vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to denial of service, or potential privilege escalation to kernel-level code execution.

🟠

Likely Case

Kernel crash/panic causing system instability or denial of service.

🟢

If Mitigated

Limited to denial of service if kernel hardening features like KASAN are enabled.

🌐 Internet-Facing: LOW - Requires local access to trigger via /proc/kallsyms or ftrace operations.
🏢 Internal Only: MEDIUM - Local users or processes with appropriate permissions can trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to load/unload modules. The buggy module condition makes exploitation less straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions with commits: 03a162933c4a, 6805582abb72, 83a692a9792a, 8690cd325845, 8e89c17dc897

Vendor Advisory: https://git.kernel.org/stable/c/03a162933c4a03b9f1a84f7d8482903c7e1e11bb

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Disable ftrace

linux

Disable the ftrace subsystem to prevent the vulnerability from being triggered.

echo 0 > /sys/kernel/debug/tracing/tracing_on
echo nop > /sys/kernel/debug/tracing/current_tracer

Restrict module loading

linux

Prevent loading of untrusted modules that could trigger the ftrace_disable condition.

echo 1 > /proc/sys/kernel/modules_disabled
sysctl -w kernel.modules_disabled=1

🧯 If You Can't Patch

  • Implement strict module loading policies and only allow trusted, signed modules.
  • Monitor for kernel panics or crashes related to ftrace operations and investigate any suspicious module activity.

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if ftrace is enabled: cat /proc/version && cat /sys/kernel/debug/tracing/tracing_on

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated to patched version and test by attempting to reproduce the described sequence with a test module.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages mentioning ftrace_mod_get_kallsym
  • Use-after-free errors in kernel logs
  • Page fault errors at address ffffffffc05d0218

Network Indicators:

  • None - this is a local kernel vulnerability

SIEM Query:

source="kernel" AND ("ftrace_mod_get_kallsym" OR "UAF" OR "page fault" AND "c05d0218")

🔗 References

📤 Share & Export