In the Linux kernel, the following vulnerability has been resolved:
module: ensure that kobject_put() is safe for module type kobjects
In 'lookup_or_create_module_kobject()', an internal kobject is created
using 'module_ktype'. So call to 'kobject_put()' on error handling
path causes an attempt to use an uninitialized completion pointer in
'module_kobject_release()'. In this scenario, we just want to release
kobject without an extra synchronization required for a regular module
unloading process, so adding an extra check whether 'complete()' is
actually required makes 'kobject_put()' safe.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
16 Dec 2025, 20:20
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/31d8df3f303c3ae9115230820977ef8c35c88808 - Patch | |
| References | () https://git.kernel.org/stable/c/93799fb988757cdacf19acba57807746c00378e6 - Patch | |
| References | () https://git.kernel.org/stable/c/9e7b49ce4f9d0cb5b6e87db9e07a2fb9e754b0dd - Patch | |
| References | () https://git.kernel.org/stable/c/a63d99873547d8b39eb2f6db79dd235761e7098a - Patch | |
| References | () https://git.kernel.org/stable/c/a6aeb739974ec73e5217c75a7c008a688d3d5cf1 - Patch | |
| References | () https://git.kernel.org/stable/c/d63851049f412cdfadaeef7a7eaef5031d11c1e9 - Patch | |
| References | () https://git.kernel.org/stable/c/f1c71b4bd721a4ea21da408806964b10468623f2 - Patch | |
| References | () https://git.kernel.org/stable/c/faa9059631d3491d699c69ecf512de9e1a3d6649 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| CWE | CWE-824 | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
03 Nov 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Jun 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
29 May 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-29 14:15
Updated : 2025-12-16 20:20
NVD link : CVE-2025-37995
Mitre link : CVE-2025-37995
CVE.ORG link : CVE-2025-37995
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-824
Access of Uninitialized Pointer
