Логотип exploitDog
bind:CVE-2025-21999
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-21999

Количество 57

Количество 57

ubuntu логотип

CVE-2025-21999

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) --> As module is already freed, will trigger UAF BUG: unable to handle page fault for address: fffffbfff80a702b PGD 817fc4067 P4D 8...

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2025-21999

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) --> As module is already freed, will trigger UAF BUG: unable to handle page fault for address: fffffbfff80a702b PGD 817fc4067 P4D 8...

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2025-21999

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter)

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2025-21999

6 месяцев назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2025-21999

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: p ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-vmv5-h8c6-426p

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) ...

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-10273

7 месяцев назад

Уязвимость функции proc_get_inode() ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

CVSS3: 8
EPSS: Низкий
rocky логотип

RLSA-2025:9348

около 1 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-9348

4 месяца назад

ELSA-2025-9348: kernel security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03184-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03179-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03153-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03148-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03212-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03207-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03180-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03165-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03160-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03133-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03129-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-21999

In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) --> As module is already freed, will trigger UAF BUG: unable to handle page fault for address: fffffbfff80a702b PGD 817fc4067 P4D 8...

CVSS3: 7.8
0%
Низкий
7 месяцев назад
redhat логотип
CVE-2025-21999

In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) --> As module is already freed, will trigger UAF BUG: unable to handle page fault for address: fffffbfff80a702b PGD 817fc4067 P4D 8...

CVSS3: 6.4
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2025-21999

In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter)

CVSS3: 7.8
0%
Низкий
7 месяцев назад
msrc логотип
CVSS3: 7.8
0%
Низкий
6 месяцев назад
debian логотип
CVE-2025-21999

In the Linux kernel, the following vulnerability has been resolved: p ...

CVSS3: 7.8
0%
Низкий
7 месяцев назад
github логотип
GHSA-vmv5-h8c6-426p

In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) ...

CVSS3: 7.8
0%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-10273

Уязвимость функции proc_get_inode() ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

CVSS3: 8
0%
Низкий
7 месяцев назад
rocky логотип
RLSA-2025:9348

Moderate: kernel security update

около 1 месяца назад
oracle-oval логотип
ELSA-2025-9348

ELSA-2025-9348: kernel security update (MODERATE)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03184-1

Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP4)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03179-1

Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP4)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03153-1

Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03148-1

Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03212-1

Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03207-1

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03180-1

Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03165-1

Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03160-1

Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03133-1

Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03129-1

Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)

около 2 месяцев назад

Уязвимостей на страницу