CVE-2025-38499
BaseFortify
Publication date: 2025-08-11
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the clone_private_mnt() function, which did not properly verify that the caller has the CAP_SYS_ADMIN capability in the correct user namespace. This check is important to ensure that the clone operation does not expose mount points that are hidden or locked in a way that cannot be undone, potentially leading to unauthorized access or manipulation of mounts. The function previously checked for certain conditions like MNT_LOCKED but missed verifying admin rights in the user namespace, which could allow bypassing intended restrictions.
How can this vulnerability impact me? :
This vulnerability could allow a user or process without proper administrative rights in a user namespace to perform clone operations that expose or manipulate mount points that should be protected. This could lead to unauthorized access to filesystem mounts or the ability to interfere with mount namespaces, potentially compromising system security or isolation between containers or users.