Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Microsoft donates DocumentDB to the Linux Foundation

      August 25, 2025

      A Week In The Life Of An AI-Augmented Designer

      August 22, 2025

      This week in AI updates: Gemini Code Assist Agent Mode, GitHub’s Agents panel, and more (August 22, 2025)

      August 22, 2025

      Microsoft adds Copilot-powered debugging features for .NET in Visual Studio

      August 21, 2025

      ChatGPT is reportedly scraping Google Search data to answer your questions – here’s how

      August 26, 2025

      The 10 best early Labor Day deals live now: Save on Apple, Samsung and more

      August 26, 2025

      5 rumored Apple iPhone Fold features that have me excited (and frustrated at the same time)

      August 26, 2025

      Forget plug-and-play AI: Here’s what successful AI projects do differently

      August 26, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Log Outgoing HTTP Requests with the Laravel Spy Package

      August 26, 2025
      Recent

      Log Outgoing HTTP Requests with the Laravel Spy Package

      August 26, 2025

      devdojo/auth

      August 26, 2025

      Rust Slices: Cutting Into References the Safe Way

      August 26, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Best AI Girlfriend Simulator [2025 Working Apps and Websites]

      August 25, 2025
      Recent

      Best AI Girlfriend Simulator [2025 Working Apps and Websites]

      August 25, 2025

      8 Best Paid and Free AI Sexting Chat Apps in 2025

      August 25, 2025

      Best AI Anime Art Generator: 7 Best to Use [Free & Premium]

      August 25, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38346 – Linux kernel ftrace UAF Vulnerability

    CVE-2025-38346 – Linux kernel ftrace UAF Vulnerability

    July 10, 2025

    CVE ID : CVE-2025-38346

    Published : July 10, 2025, 9:15 a.m. | 4 hours, 51 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    ftrace: Fix UAF when lookup kallsym after ftrace disabled

    The following issue happens with a buggy module:

    BUG: unable to handle page fault for address: ffffffffc05d0218
    PGD 1bd66f067 P4D 1bd66f067 PUD 1bd671067 PMD 101808067 PTE 0
    Oops: Oops: 0000 [#1] SMP KASAN PTI
    Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
    RIP: 0010:sized_strscpy+0x81/0x2f0
    RSP: 0018:ffff88812d76fa08 EFLAGS: 00010246
    RAX: 0000000000000000 RBX: ffffffffc0601010 RCX: dffffc0000000000
    RDX: 0000000000000038 RSI: dffffc0000000000 RDI: ffff88812608da2d
    RBP: 8080808080808080 R08: ffff88812608da2d R09: ffff88812608da68
    R10: ffff88812608d82d R11: ffff88812608d810 R12: 0000000000000038
    R13: ffff88812608da2d R14: ffffffffc05d0218 R15: fefefefefefefeff
    FS: 00007fef552de740(0000) GS:ffff8884251c7000(0000) knlGS:0000000000000000
    CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: ffffffffc05d0218 CR3: 00000001146f0000 CR4: 00000000000006f0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    Call Trace:

    ftrace_mod_get_kallsym+0x1ac/0x590
    update_iter_mod+0x239/0x5b0
    s_next+0x5b/0xa0
    seq_read_iter+0x8c9/0x1070
    seq_read+0x249/0x3b0
    proc_reg_read+0x1b0/0x280
    vfs_read+0x17f/0x920
    ksys_read+0xf3/0x1c0
    do_syscall_64+0x5f/0x2e0
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

    The above issue may happen as follows:
    (1) Add kprobe tracepoint;
    (2) insmod test.ko;
    (3) Module triggers ftrace disabled;
    (4) rmmod test.ko;
    (5) cat /proc/kallsyms; –> Will trigger UAF as test.ko already removed;
    ftrace_mod_get_kallsym()
    …
    strscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);
    …

    The problem is when a module triggers an issue with ftrace and
    sets ftrace_disable. The ftrace_disable is set when an anomaly is
    discovered and to prevent any more damage, ftrace stops all text
    modification. The issue that happened was that the ftrace_disable stops
    more than just the text modification.

    When a module is loaded, its init functions can also be traced. Because
    kallsyms deletes the init functions after a module has loaded, ftrace
    saves them when the module is loaded and function tracing is enabled. This
    allows the output of the function trace to show the init function names
    instead of just their raw memory addresses.

    When a module is removed, ftrace_release_mod() is called, and if
    ftrace_disable is set, it just returns without doing anything more. The
    problem here is that it leaves the mod_list still around and if kallsyms
    is called, it will call into this code and access the module memory that
    has already been freed as it will return:

    strscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);

    Where the “mod” no longer exists and triggers a UAF bug.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-38342 – Linux Kernel Out-of-Bounds Vulnerability in software_node_get_reference_args
    Next Article CVE-2025-38344 – Intel ACPI Cache Leak

    Related Posts

    Development

    Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing

    August 26, 2025
    Development

    Buffalo Police Detective Indicted for Attempted Purchases on Genesis Market

    August 26, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-39448 – Crocoblock JetElements For Elementor Cross-Site Scripting

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4134 – Avast Business Antivirus for Linux File Validation Bypass

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4799 – WordPress WP-DownloadManager Remote File Deletion Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code – Patch Now

    Security

    Highlights

    CVE-2025-4194 – WordPress AlT Monitoring CSRF

    May 17, 2025

    CVE ID : CVE-2025-4194

    Published : May 17, 2025, 4:16 a.m. | 28 minutes ago

    Description : The AlT Monitoring plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.3. This is due to missing or incorrect nonce validation on the ‘ALT_Monitoring_edit’ page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    Severity: 6.1 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-47886 – Jenkins Cadence vManager Plugin CSRF Vulnerability

    May 14, 2025

    Scrum Alliance and Kanban University partner to offer new course that teaches both methodologies

    July 21, 2025

    Alkem’s Enzene Biosciences Hit by Cyberattack, Funds Fraudulently Transferred

    May 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.