CVE-2025-38653

high

Description

In the Linux kernel, the following vulnerability has been resolved: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al Check pde->proc_ops->proc_lseek directly may cause UAF in rmmod scenario. It's a gap in proc_reg_open() after commit 654b33ada4ab("proc: fix UAF in proc_get_inode()"). Followed by AI Viro's suggestion, fix it in same manner.

References

https://git.kernel.org/stable/c/ff7ec8dc1b646296f8d94c39339e8d3833d16c05

https://git.kernel.org/stable/c/fc1072d934f687e1221d685cf1a49a5068318f34

https://git.kernel.org/stable/c/d136502e04d8853a9aecb335d07bbefd7a1519a8

https://git.kernel.org/stable/c/c35b0feb80b48720dfbbf4e33759c7be3faaebb6

https://git.kernel.org/stable/c/33c778ea0bd0fa62ff590497e72562ff90f82b13

https://git.kernel.org/stable/c/1fccbfbae1dd36198dc47feac696563244ad81d3

Details

Source: Mitre, NVD

Published: 2025-08-22

Updated: 2025-08-22

Risk Information

CVSS v2

Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Severity: High

EPSS

EPSS: 0.00024