CVE-2025-38498
BaseFortify
Publication date: 2025-07-30
Last updated on: 2026-01-07
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 2.6.15 (inc) to 5.4.295 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.239 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.186 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.142 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.94 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.34 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.3 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel function do_change_type(), which previously allowed changes to propagation settings on mounts that were either unmounted or not owned by the caller's mount namespace. The fix ensures that propagation settings can only be changed for mounts within the caller's own mount namespace, aligning permission checks with the rest of the mount(2) system calls.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow unauthorized changes to mount propagation settings on mounts outside the caller's namespace, potentially leading to security issues such as privilege escalation or unauthorized access to filesystem mounts.