CVE-2025-37804 Affecting kernel-rt-modules-core package, versions *


Severity

Recommended
0.0
medium
0
10

Based on CentOS security rating.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS9-KERNELRTMODULESCORE-10086802
  • published9 May 2025
  • disclosed8 May 2025

Introduced: 8 May 2025

NewCVE-2025-37804  (opens in a new tab)

How to fix?

There is no fixed version for Centos:9 kernel-rt-modules-core.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-rt-modules-core package and not the kernel-rt-modules-core package as distributed by Centos. See How to fix? for Centos:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

io_uring: always do atomic put from iowq

io_uring always switches requests to atomic refcounting for iowq execution before there is any parallilism by setting REQ_F_REFCOUNT, and the flag is not cleared until the request completes. That should be fine as long as the compiler doesn't make up a non existing value for the flags, however KCSAN still complains when the request owner changes oter flag bits:

BUG: KCSAN: data-race in io_req_task_cancel / io_wq_free_work ... read to 0xffff888117207448 of 8 bytes by task 3871 on cpu 0: req_ref_put_and_test io_uring/refs.h:22 [inline]

Skip REQ_F_REFCOUNT checks for iowq, we know it's set.

CVSS Base Scores

version 3.1