CVE-2025-68764
BaseFortify
Publication date: 2026-01-05
Last updated on: 2026-01-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of automounted filesystems. When a filesystem is automounted, it should inherit certain mount options set by the user, such as 'ro' (read-only), 'noexec' (no execution of binaries), 'nodev' (no device files), and 'sync' (synchronous writes). The issue was that these flags were not properly preserved during automounting, potentially leading to security risks.
How can this vulnerability impact me? :
If automounted filesystems do not inherit the intended mount options like 'ro', 'noexec', 'nodev', and 'sync', it could allow unauthorized modifications, execution of malicious binaries, or device file access on those filesystems. This can lead to security breaches, data corruption, or system compromise.