First published: Thu May 08 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: riscv: uprobes: Add missing fence.i after building the XOL buffer The XOL (execute out-of-line) buffer is used to single-step the replaced instruction(s) for uprobes. The RISC-V port was missing a proper fence.i (i$ flushing) after constructing the XOL buffer, which can result in incorrect execution of stale/broken instructions. This was found running the BPF selftests "test_progs: uprobe_autoattach, attach_probe" on the Spacemit K1/X60, where the uprobes tests randomly blew up.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-37822 has a medium severity rating due to the potential risk associated with improper handling of the XOL buffer in the Linux kernel.
To fix CVE-2025-37822, update your Linux kernel to the latest stable version that addresses the missing fence.i for uprobes.
CVE-2025-37822 affects the Linux kernel, specifically the RISC-V port implementation.
Exploitation of CVE-2025-37822 could potentially lead to execution of unauthorized instructions or disruption of processes using uprobes.
CVE-2025-37822 was disclosed following updates to the Linux kernel to address related vulnerabilities.