CVE-2019-25044
Container-Optimized OS vulnerability analysis and mitigation

Overview

The block subsystem in the Linux kernel before version 5.2 contains a use-after-free vulnerability (CVE-2019-25044) that can lead to arbitrary code execution in the kernel context and privilege escalation. The vulnerability is related to blkmqfreerqs and blkcleanup_queue functions, also known as CID-c3e2219216c9 (NVD).

Technical details

The vulnerability stems from a use-after-free condition in the block subsystem where a freed object is accessed in the blkmqfreerqs function. The issue occurs when the vulnerable object is accidentally freed in loopremove, but then accessed later in blkmqfreerqs, triggering an unauthorized memory access. The vulnerability has a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD, [SyzScope](https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-blkmqfreerqs)).

Impact

The vulnerability can be exploited to achieve arbitrary code execution in the kernel context through control flow hijacking. Attackers can potentially overwrite the freed object through heap spraying and hijack control flow when dereferencing function pointers, leading to privilege escalation. This could result in complete system compromise with high impact on confidentiality, integrity, and availability (SyzScope).

Mitigation and workarounds

The vulnerability was fixed in Linux kernel version 5.2 through commit c3e2219216c9, which addresses the issue by moving the freeing of request pool of sched tags into blkcleanupqueue. This ensures proper cleanup timing and prevents the use-after-free condition (Kernel Commit).

Community reactions

NetApp has issued an advisory acknowledging the vulnerability's impact on several of their products, including Cloud Backup, HCI Baseboard Management Controller, and SolidFire & HCI Management Node. They have provided fixes for some affected products while marking others as 'Won't Fix' due to end-of-availability (NetApp Advisory).

Additional resources


SourceThis report was generated using AI

Related Container-Optimized OS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-52565HIGH8.4
  • cAdvisorcAdvisor
  • runc-debuginfo
NoYesNov 06, 2025
CVE-2025-52881HIGH7.3
  • cAdvisorcAdvisor
  • mesosphere-vsphere-csi
NoYesNov 06, 2025
CVE-2025-31133HIGH7.3
  • cAdvisorcAdvisor
  • crun
NoYesNov 06, 2025
CVE-2025-40105HIGH7.1
  • Linux KernelLinux Kernel
  • kernel-64k-modules-partner
NoYesOct 30, 2025
CVE-2025-40109MEDIUM4.2
  • Linux KernelLinux Kernel
  • kernel-rt-64k-modules-partner
NoYesNov 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management