
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability was discovered in the ftrace_location() function of the Linux kernel's ftrace subsystem. The vulnerability was identified in June 2024 and assigned CVE-2025-38588. The issue affects multiple Linux distributions including Ubuntu and Oracle Linux (Ubuntu Security, Oracle Linux).
The vulnerability occurs in the ftracelocation() function where a race condition exists between registerkprobes() and deletemodule() operations. Specifically, while lookuprec() searches for ftrace records in module pages, those same pages may be freed by ftracereleasemod() during module deletion. The CVSS v3.1 base score is 7.8 (High), with attack vector being Local, requiring low attack complexity (Ubuntu Security).
A local attacker could exploit this vulnerability to cause a denial of service (system crash) or potentially execute arbitrary code. The vulnerability affects system stability and potentially system integrity when exploited (Ubuntu Security).
The vulnerability has been fixed through several measures: 1) Holding rcu lock when accessing ftrace pages in ftracelocationrange(), 2) Using ftracelocationrange() instead of lookuprec() in ftracelocation(), and 3) Calling synchronizercu() before freeing any ftrace pages in ftraceprocesslocs()/ftracereleasemod()/ftracefree_mem(). Updates are available for affected Linux distributions (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."