CVE-2025-38653 — Use After Free in Linux
Severity
7.8HIGHNVD
EPSS
0.0%
top 95.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 22
Latest updateMar 25
Description
In the Linux kernel, the following vulnerability has been resolved:
proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al
Check pde->proc_ops->proc_lseek directly may cause UAF in rmmod scenario.
It's a gap in proc_reg_open() after commit 654b33ada4ab("proc: fix UAF in
proc_get_inode()"). Followed by AI Viro's suggestion, fix it in same
manner.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages3 packages
▶CVEListV5linux/linux3f61631d47f115b83c935d0039f95cb68b0c8ab7 — c35b0feb80b48720dfbbf4e33759c7be3faaebb6+6
Also affects: Debian Linux 11.0
Patches
🔴Vulnerability Details
3CVEList
▶
GHSA▶
GHSA-w76p-w3h3-c35v: In the Linux kernel, the following vulnerability has been resolved:
proc: use the same treatment to check proc_lseek as ones for proc_read_iter et↗2025-08-22
OSV▶
CVE-2025-38653: In the Linux kernel, the following vulnerability has been resolved: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et↗2025-08-22