CVE-2025-37822
Linux Debian vulnerability analysis and mitigation

Overview

In the Linux kernel, a vulnerability has been identified and resolved regarding the RISC-V port's uprobes functionality. The issue involves a missing fence.i instruction after building the XOL (execute out-of-line) buffer, which is used to single-step replaced instructions for uprobes. This vulnerability was discovered when running BPF selftests on the Spacemit K1/X60, where uprobes tests randomly failed (NVD).

Technical details

The vulnerability stems from the absence of a proper fence.i (instruction cache flushing) after constructing the XOL buffer in the RISC-V implementation. The XOL buffer is utilized for single-stepping replaced instructions during uprobe operations. Without the proper fence.i instruction, the system can execute stale or broken instructions, leading to incorrect execution. This issue specifically manifests during the execution of BPF selftests, particularly in the 'testprogs: uprobeautoattach, attach_probe' tests (NVD).

Impact

The vulnerability can result in the incorrect execution of instructions due to instruction cache coherency issues. This could potentially lead to system instability or unpredictable behavior when using uprobes on RISC-V systems (NVD).

Mitigation and workarounds

The vulnerability has been resolved by adding the missing fence.i instruction after building the XOL buffer in the RISC-V implementation. Users should update to the patched version of the Linux kernel that includes this fix (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management