[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025071035-CVE-2025-38346-8cb6@gregkh>
Date: Thu, 10 Jul 2025 10:15:54 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-38346: ftrace: Fix UAF when lookup kallsym after ftrace disabled
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
ftrace: Fix UAF when lookup kallsym after ftrace disabled
The following issue happens with a buggy module:
BUG: unable to handle page fault for address: ffffffffc05d0218
PGD 1bd66f067 P4D 1bd66f067 PUD 1bd671067 PMD 101808067 PTE 0
Oops: Oops: 0000 [#1] SMP KASAN PTI
Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
RIP: 0010:sized_strscpy+0x81/0x2f0
RSP: 0018:ffff88812d76fa08 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffffffc0601010 RCX: dffffc0000000000
RDX: 0000000000000038 RSI: dffffc0000000000 RDI: ffff88812608da2d
RBP: 8080808080808080 R08: ffff88812608da2d R09: ffff88812608da68
R10: ffff88812608d82d R11: ffff88812608d810 R12: 0000000000000038
R13: ffff88812608da2d R14: ffffffffc05d0218 R15: fefefefefefefeff
FS: 00007fef552de740(0000) GS:ffff8884251c7000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffc05d0218 CR3: 00000001146f0000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
ftrace_mod_get_kallsym+0x1ac/0x590
update_iter_mod+0x239/0x5b0
s_next+0x5b/0xa0
seq_read_iter+0x8c9/0x1070
seq_read+0x249/0x3b0
proc_reg_read+0x1b0/0x280
vfs_read+0x17f/0x920
ksys_read+0xf3/0x1c0
do_syscall_64+0x5f/0x2e0
entry_SYSCALL_64_after_hwframe+0x76/0x7e
The above issue may happen as follows:
(1) Add kprobe tracepoint;
(2) insmod test.ko;
(3) Module triggers ftrace disabled;
(4) rmmod test.ko;
(5) cat /proc/kallsyms; --> Will trigger UAF as test.ko already removed;
ftrace_mod_get_kallsym()
...
strscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);
...
The problem is when a module triggers an issue with ftrace and
sets ftrace_disable. The ftrace_disable is set when an anomaly is
discovered and to prevent any more damage, ftrace stops all text
modification. The issue that happened was that the ftrace_disable stops
more than just the text modification.
When a module is loaded, its init functions can also be traced. Because
kallsyms deletes the init functions after a module has loaded, ftrace
saves them when the module is loaded and function tracing is enabled. This
allows the output of the function trace to show the init function names
instead of just their raw memory addresses.
When a module is removed, ftrace_release_mod() is called, and if
ftrace_disable is set, it just returns without doing anything more. The
problem here is that it leaves the mod_list still around and if kallsyms
is called, it will call into this code and access the module memory that
has already been freed as it will return:
strscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);
Where the "mod" no longer exists and triggers a UAF bug.
The Linux kernel CVE team has assigned CVE-2025-38346 to this issue.
Affected and fixed versions
===========================
Issue introduced in 4.15 with commit aba4b5c22cbac296f4081a0476d0c55828f135b4 and fixed in 5.4.295 with commit d064c68781c19f378af1ae741d9132d35d24b2bb
Issue introduced in 4.15 with commit aba4b5c22cbac296f4081a0476d0c55828f135b4 and fixed in 5.10.239 with commit 8690cd3258455bbae64f809e1d3ee0f043661c71
Issue introduced in 4.15 with commit aba4b5c22cbac296f4081a0476d0c55828f135b4 and fixed in 5.15.186 with commit 6805582abb720681dd1c87ff677f155dcf4e86c9
Issue introduced in 4.15 with commit aba4b5c22cbac296f4081a0476d0c55828f135b4 and fixed in 6.1.142 with commit 03a162933c4a03b9f1a84f7d8482903c7e1e11bb
Issue introduced in 4.15 with commit aba4b5c22cbac296f4081a0476d0c55828f135b4 and fixed in 6.6.95 with commit 83a692a9792aa86249d68a8ac0b9d55ecdd255fa
Issue introduced in 4.15 with commit aba4b5c22cbac296f4081a0476d0c55828f135b4 and fixed in 6.12.35 with commit 8e89c17dc8970c5f71a3a991f5724d4c8de42d8c
Issue introduced in 4.15 with commit aba4b5c22cbac296f4081a0476d0c55828f135b4 and fixed in 6.15.4 with commit f78a786ad9a5443a29eef4dae60cde85b7375129
Issue introduced in 4.15 with commit aba4b5c22cbac296f4081a0476d0c55828f135b4 and fixed in 6.16-rc1 with commit f914b52c379c12288b7623bb814d0508dbe7481d
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-38346
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
kernel/trace/ftrace.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/d064c68781c19f378af1ae741d9132d35d24b2bb
https://git.kernel.org/stable/c/8690cd3258455bbae64f809e1d3ee0f043661c71
https://git.kernel.org/stable/c/6805582abb720681dd1c87ff677f155dcf4e86c9
https://git.kernel.org/stable/c/03a162933c4a03b9f1a84f7d8482903c7e1e11bb
https://git.kernel.org/stable/c/83a692a9792aa86249d68a8ac0b9d55ecdd255fa
https://git.kernel.org/stable/c/8e89c17dc8970c5f71a3a991f5724d4c8de42d8c
https://git.kernel.org/stable/c/f78a786ad9a5443a29eef4dae60cde85b7375129
https://git.kernel.org/stable/c/f914b52c379c12288b7623bb814d0508dbe7481d
Powered by blists - more mailing lists