CVE-2025-38653Use After Free in Linux

CWE-416Use After Free26 documents8 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 95.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 22
Latest updateMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al Check pde->proc_ops->proc_lseek directly may cause UAF in rmmod scenario. It's a gap in proc_reg_open() after commit 654b33ada4ab("proc: fix UAF in proc_get_inode()"). Followed by AI Viro's suggestion, fix it in same manner.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDlinux/linux_kernel6.06.1.148+4
Debianlinux/linux_kernel< 6.1.148-1+2
CVEListV5linux/linux3f61631d47f115b83c935d0039f95cb68b0c8ab7c35b0feb80b48720dfbbf4e33759c7be3faaebb6+6

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

3
CVEList
proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al2025-08-22
GHSA
GHSA-w76p-w3h3-c35v: In the Linux kernel, the following vulnerability has been resolved: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et2025-08-22
OSV
CVE-2025-38653: In the Linux kernel, the following vulnerability has been resolved: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et2025-08-22

📋Vendor Advisories

22
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-25
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-04
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2026-03-04
Ubuntu
Linux kernel (Xilinx) vulnerabilities2026-02-24
Ubuntu
Linux kernel (IBM) vulnerabilities2026-02-24
CVE-2025-38653 — Use After Free in Linux | cvebase