Home

Description

In the Linux kernel, the following vulnerability has been resolved: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al Check pde->proc_ops->proc_lseek directly may cause UAF in rmmod scenario. It's a gap in proc_reg_open() after commit 654b33ada4ab("proc: fix UAF in proc_get_inode()"). Followed by AI Viro's suggestion, fix it in same manner.

PUBLISHED Reserved 2025-04-16 | Published 2025-08-22 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

3f61631d47f115b83c935d0039f95cb68b0c8ab7 before c35b0feb80b48720dfbbf4e33759c7be3faaebb6
affected

3f61631d47f115b83c935d0039f95cb68b0c8ab7 before 33c778ea0bd0fa62ff590497e72562ff90f82b13
affected

3f61631d47f115b83c935d0039f95cb68b0c8ab7 before fc1072d934f687e1221d685cf1a49a5068318f34
affected

3f61631d47f115b83c935d0039f95cb68b0c8ab7 before d136502e04d8853a9aecb335d07bbefd7a1519a8
affected

3f61631d47f115b83c935d0039f95cb68b0c8ab7 before 1fccbfbae1dd36198dc47feac696563244ad81d3
affected

3f61631d47f115b83c935d0039f95cb68b0c8ab7 before ff7ec8dc1b646296f8d94c39339e8d3833d16c05
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

6.1.148
unaffected

6.6.102
unaffected

6.12.42
unaffected

6.15.10
unaffected

6.16.1
unaffected

6.17
unaffected

References

git.kernel.org/...c/c35b0feb80b48720dfbbf4e33759c7be3faaebb6

git.kernel.org/...c/33c778ea0bd0fa62ff590497e72562ff90f82b13

git.kernel.org/...c/fc1072d934f687e1221d685cf1a49a5068318f34

git.kernel.org/...c/d136502e04d8853a9aecb335d07bbefd7a1519a8

git.kernel.org/...c/1fccbfbae1dd36198dc47feac696563244ad81d3

git.kernel.org/...c/ff7ec8dc1b646296f8d94c39339e8d3833d16c05

cve.org (CVE-2025-38653)

nvd.nist.gov (CVE-2025-38653)

Download JSON