CVE-2025-38653
BaseFortify
Publication date: 2025-08-22
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability can lead to a Use-After-Free (UAF) condition in the Linux kernel when removing kernel modules. This could potentially cause system instability, crashes, or allow an attacker to execute arbitrary code with kernel privileges, depending on the exploitation scenario.
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves improper handling of the proc_lseek operation in the proc filesystem. Specifically, checking pde->proc_ops->proc_lseek directly can cause a Use-After-Free (UAF) condition during the removal of kernel modules (rmmod). This issue is due to a gap in the proc_reg_open() function following a previous fix, and it has been addressed by applying a similar fix as suggested by AI Viro.