๐Ÿ” CVE Alert

CVE-2025-40271

UNKNOWN 0.0

fs/proc: fix uaf in proc_readdir_de()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix uaf in proc_readdir_de() Pde is erased from subdir rbtree through rb_erase(), but not set the node to EMPTY, which may result in uaf access. We should use RB_CLEAR_NODE() set the erased node to EMPTY, then pde_subdir_next() will return NULL to avoid uaf access. We found an uaf issue while using stress-ng testing, need to run testcase getdent and tun in the same time. The steps of the issue is as follows: 1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current pde is tun3; 2) in the [time windows] unregister netdevice tun3 and tun2, and erase them from rbtree. erase tun3 first, and then erase tun2. the pde(tun2) will be released to slab; 3) continue to getdent process, then pde_subdir_next() will return pde(tun2) which is released, it will case uaf access. CPU 0 | CPU 1 ------------------------------------------------------------------------- traverse dir /proc/pid/net/dev_snmp6/ | unregister_netdevice(tun->dev) //tun3 tun2 sys_getdents64() | iterate_dir() | proc_readdir() | proc_readdir_de() | snmp6_unregister_dev() pde_get(de); | proc_remove() read_unlock(&proc_subdir_lock); | remove_proc_subtree() | write_lock(&proc_subdir_lock); [time window] | rb_erase(&root->subdir_node, &parent->subdir); | write_unlock(&proc_subdir_lock); read_lock(&proc_subdir_lock); | next = pde_subdir_next(de); | pde_put(de); | de = next; //UAF | rbtree of dev_snmp6 | pde(tun3) / \ NULL pde(tun2)

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 6, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
710585d4922fd315f2cada8fbe550ae8ed23e994 < 1d1596d68a6f11d28f677eedf6cf5b17dbfeb491 710585d4922fd315f2cada8fbe550ae8ed23e994 < c81d0385500446efe48c305bbb83d47f2ae23a50 710585d4922fd315f2cada8fbe550ae8ed23e994 < 4cba73c4c89219beef7685a47374bf88b1022369 710585d4922fd315f2cada8fbe550ae8ed23e994 < 6f2482745e510ae1dacc9b090194b9c5f918d774 710585d4922fd315f2cada8fbe550ae8ed23e994 < 67272c11f379d9aa5e0f6b16286b9d89b3f76046 710585d4922fd315f2cada8fbe550ae8ed23e994 < 623bb26127fb581a741e880e1e1a47d79aecb6f8 710585d4922fd315f2cada8fbe550ae8ed23e994 < 03de7ff197a3d0e17d0d5c58fdac99a63cba8110 710585d4922fd315f2cada8fbe550ae8ed23e994 < 895b4c0c79b092d732544011c3cecaf7322c36a1
Linux / Linux
3.19

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/1d1596d68a6f11d28f677eedf6cf5b17dbfeb491 git.kernel.org: https://git.kernel.org/stable/c/c81d0385500446efe48c305bbb83d47f2ae23a50 git.kernel.org: https://git.kernel.org/stable/c/4cba73c4c89219beef7685a47374bf88b1022369 git.kernel.org: https://git.kernel.org/stable/c/6f2482745e510ae1dacc9b090194b9c5f918d774 git.kernel.org: https://git.kernel.org/stable/c/67272c11f379d9aa5e0f6b16286b9d89b3f76046 git.kernel.org: https://git.kernel.org/stable/c/623bb26127fb581a741e880e1e1a47d79aecb6f8 git.kernel.org: https://git.kernel.org/stable/c/03de7ff197a3d0e17d0d5c58fdac99a63cba8110 git.kernel.org: https://git.kernel.org/stable/c/895b4c0c79b092d732544011c3cecaf7322c36a1