-

CVE-2025-38653

In the Linux kernel, the following vulnerability has been resolved:

proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al

Check pde->proc_ops->proc_lseek directly may cause UAF in rmmod scenario. 
It's a gap in proc_reg_open() after commit 654b33ada4ab("proc: fix UAF in
proc_get_inode()").  Followed by AI Viro's suggestion, fix it in same
manner.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < c35b0feb80b48720dfbbf4e33759c7be3faaebb6
Version 3f61631d47f115b83c935d0039f95cb68b0c8ab7
Status affected
Version < 33c778ea0bd0fa62ff590497e72562ff90f82b13
Version 3f61631d47f115b83c935d0039f95cb68b0c8ab7
Status affected
Version < fc1072d934f687e1221d685cf1a49a5068318f34
Version 3f61631d47f115b83c935d0039f95cb68b0c8ab7
Status affected
Version < d136502e04d8853a9aecb335d07bbefd7a1519a8
Version 3f61631d47f115b83c935d0039f95cb68b0c8ab7
Status affected
Version < 1fccbfbae1dd36198dc47feac696563244ad81d3
Version 3f61631d47f115b83c935d0039f95cb68b0c8ab7
Status affected
Version < ff7ec8dc1b646296f8d94c39339e8d3833d16c05
Version 3f61631d47f115b83c935d0039f95cb68b0c8ab7
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.0
Status affected
Version < 6.0
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.089
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string