CVE-2025-38346
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2025-38346 is a vulnerability in the Linux kernel discovered and disclosed on July 10, 2025. The issue affects the ftrace functionality when handling module unloading, specifically related to a Use-After-Free (UAF) condition when looking up kallsyms after ftrace is disabled (NVD CVE).

Technical details

The vulnerability occurs when a module triggers an issue with ftrace and sets ftracedisable. When ftracedisable is set to prevent text modification after an anomaly is discovered, it stops more than just the text modification. The issue arises because when a module is removed and ftracereleasemod() is called with ftracedisable set, it returns without proper cleanup, leaving the modlist still accessible. This leads to a UAF vulnerability when kallsyms is accessed, attempting to use the freed module memory through strscpy(modulename, modmap->mod->name, MODULENAMELEN) (Debian Tracker).

Impact

The vulnerability can be triggered through a specific sequence of actions: adding a kprobe tracepoint, loading a module (insmod test.ko), having the module trigger ftrace disabled, removing the module (rmmod test.ko), and then accessing /proc/kallsyms. This sequence results in a Use-After-Free condition that could potentially lead to system crashes or memory corruption (NVD CVE).

Mitigation and workarounds

The issue has been fixed in Linux kernel version 6.12.35-1 and later. Systems running older versions should upgrade to the patched versions. Debian distributions have different statuses: trixie and sid are fixed with versions 6.12.35-1 and 6.12.38-1 respectively, while bullseye and bookworm remain vulnerable (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40258HIGH7
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-devel-matched
NoNoDec 04, 2025
CVE-2025-40259MEDIUM6.2
  • Linux KernelLinux Kernel
  • kernel-rt-64k
NoNoDec 04, 2025
CVE-2025-40264MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-modules-extra
NoNoDec 04, 2025
CVE-2025-40254MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-devel-matched
NoNoDec 04, 2025
CVE-2025-40253MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-debug-modules-partner
NoNoDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management