Количество 57
Количество 57
BDU:2025-10273
Уязвимость функции proc_get_inode() ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
CVE-2025-21999
In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) --> As module is already freed, will trigger UAF BUG: unable to handle page fault for address: fffffbfff80a702b PGD 817fc4067 P4D 8...
CVE-2025-21999
In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) --> As module is already freed, will trigger UAF BUG: unable to handle page fault for address: fffffbfff80a702b PGD 817fc4067 P4D 8...
CVE-2025-21999
In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter)
CVE-2025-21999
CVE-2025-21999
In the Linux kernel, the following vulnerability has been resolved: p ...
GHSA-vmv5-h8c6-426p
In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) ...
RLSA-2025:9348
Moderate: kernel security update
ELSA-2025-9348
ELSA-2025-9348: kernel security update (MODERATE)
SUSE-SU-2025:03184-1
Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP4)
SUSE-SU-2025:03179-1
Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP4)
SUSE-SU-2025:03153-1
Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)
SUSE-SU-2025:03148-1
Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3)
SUSE-SU-2025:03212-1
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6)
SUSE-SU-2025:03207-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5)
SUSE-SU-2025:03180-1
Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4)
SUSE-SU-2025:03165-1
Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4)
SUSE-SU-2025:03160-1
Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4)
SUSE-SU-2025:03133-1
Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3)
SUSE-SU-2025:03129-1
Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)
Уязвимостей на страницу
Уязвимость  | CVSS  | EPSS  | Опубликовано  | |
|---|---|---|---|---|
BDU:2025-10273 Уязвимость функции proc_get_inode() ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код  | CVSS3: 8  | 0% Низкий | 7 месяцев назад | |
CVE-2025-21999 In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) --> As module is already freed, will trigger UAF BUG: unable to handle page fault for address: fffffbfff80a702b PGD 817fc4067 P4D 8...  | CVSS3: 7.8  | 0% Низкий | 7 месяцев назад | |
CVE-2025-21999 In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) --> As module is already freed, will trigger UAF BUG: unable to handle page fault for address: fffffbfff80a702b PGD 817fc4067 P4D 8...  | CVSS3: 6.4  | 0% Низкий | 7 месяцев назад | |
CVE-2025-21999 In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter)  | CVSS3: 7.8  | 0% Низкий | 7 месяцев назад | |
CVSS3: 7.8  | 0% Низкий | 6 месяцев назад | ||
CVE-2025-21999 In the Linux kernel, the following vulnerability has been resolved: p ...  | CVSS3: 7.8  | 0% Низкий | 7 месяцев назад | |
GHSA-vmv5-h8c6-426p In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) ...  | CVSS3: 7.8  | 0% Низкий | 7 месяцев назад | |
RLSA-2025:9348 Moderate: kernel security update  | около 1 месяца назад | |||
ELSA-2025-9348 ELSA-2025-9348: kernel security update (MODERATE)  | 4 месяца назад | |||
SUSE-SU-2025:03184-1 Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP4)  | около 2 месяцев назад | |||
SUSE-SU-2025:03179-1 Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP4)  | около 2 месяцев назад | |||
SUSE-SU-2025:03153-1 Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)  | около 2 месяцев назад | |||
SUSE-SU-2025:03148-1 Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3)  | около 2 месяцев назад | |||
SUSE-SU-2025:03212-1 Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6)  | около 2 месяцев назад | |||
SUSE-SU-2025:03207-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5)  | около 2 месяцев назад | |||
SUSE-SU-2025:03180-1 Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4)  | около 2 месяцев назад | |||
SUSE-SU-2025:03165-1 Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4)  | около 2 месяцев назад | |||
SUSE-SU-2025:03160-1 Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4)  | около 2 месяцев назад | |||
SUSE-SU-2025:03133-1 Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3)  | около 2 месяцев назад | |||
SUSE-SU-2025:03129-1 Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)  | около 2 месяцев назад | 
Уязвимостей на страницу