Description
In the Linux kernel, the following vulnerability has been resolved: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al Check pde->proc_ops->proc_lseek directly may cause UAF in rmmod scenario. It's a gap in proc_reg_open() after commit 654b33ada4ab("proc: fix UAF in proc_get_inode()"). Followed by AI Viro's suggestion, fix it in same manner.
Product status
3f61631d47f115b83c935d0039f95cb68b0c8ab7 before c35b0feb80b48720dfbbf4e33759c7be3faaebb6
3f61631d47f115b83c935d0039f95cb68b0c8ab7 before 33c778ea0bd0fa62ff590497e72562ff90f82b13
3f61631d47f115b83c935d0039f95cb68b0c8ab7 before fc1072d934f687e1221d685cf1a49a5068318f34
3f61631d47f115b83c935d0039f95cb68b0c8ab7 before d136502e04d8853a9aecb335d07bbefd7a1519a8
3f61631d47f115b83c935d0039f95cb68b0c8ab7 before 1fccbfbae1dd36198dc47feac696563244ad81d3
3f61631d47f115b83c935d0039f95cb68b0c8ab7 before ff7ec8dc1b646296f8d94c39339e8d3833d16c05
6.0
Any version before 6.0
6.1.148
6.6.102
6.12.42
6.15.10
6.16.1
6.17
References
git.kernel.org/...c/c35b0feb80b48720dfbbf4e33759c7be3faaebb6
git.kernel.org/...c/33c778ea0bd0fa62ff590497e72562ff90f82b13
git.kernel.org/...c/fc1072d934f687e1221d685cf1a49a5068318f34
git.kernel.org/...c/d136502e04d8853a9aecb335d07bbefd7a1519a8
git.kernel.org/...c/1fccbfbae1dd36198dc47feac696563244ad81d3
git.kernel.org/...c/ff7ec8dc1b646296f8d94c39339e8d3833d16c05