5.5
CVE-2025-38003
- EPSS 0.03%
- Veröffentlicht 08.06.2025 10:34:55
- Zuletzt bearbeitet 17.12.2025 20:04:26
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: can: bcm: add missing rcu read protection for procfs content When the procfs content is generated for a bcm_op which is in the process to be removed the procfs output might show unreliable data (UAF). As the removal of bcm_op's is already implemented with rcu handling this patch adds the missing rcu_read_lock() and makes sure the list entries are properly removed under rcu protection.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 4.19.252 < 4.20
Linux ≫ Linux Kernel Version >= 5.4.205 < 5.4.294
Linux ≫ Linux Kernel Version >= 5.10.130 < 5.10.238
Linux ≫ Linux Kernel Version >= 5.15.54 < 5.15.185
Linux ≫ Linux Kernel Version >= 5.18.11 < 5.19
Linux ≫ Linux Kernel Version >= 5.19.1 < 6.1.141
Linux ≫ Linux Kernel Version >= 6.2 < 6.6.93
Linux ≫ Linux Kernel Version >= 6.7 < 6.12.31
Linux ≫ Linux Kernel Version >= 6.13 < 6.14.9
Linux ≫ Linux Kernel Version5.19 Update-
Linux ≫ Linux Kernel Version5.19 Updaterc6
Linux ≫ Linux Kernel Version5.19 Updaterc7
Linux ≫ Linux Kernel Version5.19 Updaterc8
Linux ≫ Linux Kernel Version6.15 Updaterc1
Linux ≫ Linux Kernel Version6.15 Updaterc2
Linux ≫ Linux Kernel Version6.15 Updaterc3
Linux ≫ Linux Kernel Version6.15 Updaterc4
Linux ≫ Linux Kernel Version6.15 Updaterc5
Linux ≫ Linux Kernel Version6.15 Updaterc6
Linux ≫ Linux Kernel Version6.15 Updaterc7
Debian ≫ Debian Linux Version11.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.09 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|