CVE-2025-38396
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a security issue in the Linux kernel related to the creation of anonymous inodes with proper security contexts. The function anon_inode_make_secure_inode() was exported to replace a less secure pattern that manually created security contexts, fixing a security regression in the secretmem subsystem where a flag (S_PRIVATE) was not cleared properly. This flaw allowed LSM/SELinux security checks to be bypassed for secretmem file descriptors, potentially weakening the kernel's security enforcement.
How can this vulnerability impact me? :
The vulnerability could allow security checks enforced by Linux Security Modules (LSM) like SELinux to be bypassed for certain secret memory file descriptors. This means that unauthorized access or actions might be possible on sensitive memory areas, potentially leading to privilege escalation or data leakage within systems using the affected Linux kernel.