In the Linux kernel, the following vulnerability has been resolved:
module: ensure that kobject_put() is safe for module type kobjects
In 'lookuporcreatemodulekobject()', an internal kobject is created using 'modulektype'. So call to 'kobjectput()' on error handling path causes an attempt to use an uninitialized completion pointer in 'modulekobjectrelease()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.
[
{
"signature_version": "v1",
"digest": {
"length": 116.0,
"function_hash": "154066604678392319918221547758073628950"
},
"signature_type": "Function",
"id": "CVE-2025-37995-215cad18",
"target": {
"file": "kernel/params.c",
"function": "module_kobj_release"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@31d8df3f303c3ae9115230820977ef8c35c88808",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 116.0,
"function_hash": "154066604678392319918221547758073628950"
},
"signature_type": "Function",
"id": "CVE-2025-37995-244fdf0e",
"target": {
"file": "kernel/params.c",
"function": "module_kobj_release"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a63d99873547d8b39eb2f6db79dd235761e7098a",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"225293585400762180584264321525658455722",
"63736254697709869480853431718156443511",
"141760022036276412794866489527211260184",
"154609835652205585814321572070303642824"
]
},
"signature_type": "Line",
"id": "CVE-2025-37995-325744a4",
"target": {
"file": "kernel/params.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@31d8df3f303c3ae9115230820977ef8c35c88808",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"225293585400762180584264321525658455722",
"63736254697709869480853431718156443511",
"141760022036276412794866489527211260184",
"154609835652205585814321572070303642824"
]
},
"signature_type": "Line",
"id": "CVE-2025-37995-36997e29",
"target": {
"file": "kernel/params.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a6aeb739974ec73e5217c75a7c008a688d3d5cf1",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"225293585400762180584264321525658455722",
"63736254697709869480853431718156443511",
"284534831325197749120497637162553682935",
"60614390620500478825995725112676351005"
]
},
"signature_type": "Line",
"id": "CVE-2025-37995-3dcebffa",
"target": {
"file": "kernel/params.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9e7b49ce4f9d0cb5b6e87db9e07a2fb9e754b0dd",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 116.0,
"function_hash": "154066604678392319918221547758073628950"
},
"signature_type": "Function",
"id": "CVE-2025-37995-459b96bb",
"target": {
"file": "kernel/params.c",
"function": "module_kobj_release"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d63851049f412cdfadaeef7a7eaef5031d11c1e9",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"225293585400762180584264321525658455722",
"63736254697709869480853431718156443511",
"284534831325197749120497637162553682935",
"60614390620500478825995725112676351005"
]
},
"signature_type": "Line",
"id": "CVE-2025-37995-6d64705a",
"target": {
"file": "kernel/params.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a63d99873547d8b39eb2f6db79dd235761e7098a",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 116.0,
"function_hash": "154066604678392319918221547758073628950"
},
"signature_type": "Function",
"id": "CVE-2025-37995-72d3185b",
"target": {
"file": "kernel/params.c",
"function": "module_kobj_release"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@93799fb988757cdacf19acba57807746c00378e6",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 116.0,
"function_hash": "154066604678392319918221547758073628950"
},
"signature_type": "Function",
"id": "CVE-2025-37995-9ee60ca6",
"target": {
"file": "kernel/params.c",
"function": "module_kobj_release"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a6aeb739974ec73e5217c75a7c008a688d3d5cf1",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"225293585400762180584264321525658455722",
"63736254697709869480853431718156443511",
"284534831325197749120497637162553682935",
"60614390620500478825995725112676351005"
]
},
"signature_type": "Line",
"id": "CVE-2025-37995-b6a7698b",
"target": {
"file": "kernel/params.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@93799fb988757cdacf19acba57807746c00378e6",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 116.0,
"function_hash": "154066604678392319918221547758073628950"
},
"signature_type": "Function",
"id": "CVE-2025-37995-c1754989",
"target": {
"file": "kernel/params.c",
"function": "module_kobj_release"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9e7b49ce4f9d0cb5b6e87db9e07a2fb9e754b0dd",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"225293585400762180584264321525658455722",
"63736254697709869480853431718156443511",
"141760022036276412794866489527211260184",
"154609835652205585814321572070303642824"
]
},
"signature_type": "Line",
"id": "CVE-2025-37995-d63897f4",
"target": {
"file": "kernel/params.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@faa9059631d3491d699c69ecf512de9e1a3d6649",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 116.0,
"function_hash": "154066604678392319918221547758073628950"
},
"signature_type": "Function",
"id": "CVE-2025-37995-dcc2fc21",
"target": {
"file": "kernel/params.c",
"function": "module_kobj_release"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f1c71b4bd721a4ea21da408806964b10468623f2",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"225293585400762180584264321525658455722",
"63736254697709869480853431718156443511",
"141760022036276412794866489527211260184",
"154609835652205585814321572070303642824"
]
},
"signature_type": "Line",
"id": "CVE-2025-37995-e43a9810",
"target": {
"file": "kernel/params.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d63851049f412cdfadaeef7a7eaef5031d11c1e9",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 116.0,
"function_hash": "154066604678392319918221547758073628950"
},
"signature_type": "Function",
"id": "CVE-2025-37995-e95339f6",
"target": {
"file": "kernel/params.c",
"function": "module_kobj_release"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@faa9059631d3491d699c69ecf512de9e1a3d6649",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"225293585400762180584264321525658455722",
"63736254697709869480853431718156443511",
"284534831325197749120497637162553682935",
"60614390620500478825995725112676351005"
]
},
"signature_type": "Line",
"id": "CVE-2025-37995-f25757a4",
"target": {
"file": "kernel/params.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f1c71b4bd721a4ea21da408806964b10468623f2",
"deprecated": false
}
]