-

CVE-2025-38396

In the Linux kernel, the following vulnerability has been resolved:

fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass

Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create
anonymous inodes with proper security context. This replaces the current
pattern of calling alloc_anon_inode() followed by
inode_init_security_anon() for creating security context manually.

This change also fixes a security regression in secretmem where the
S_PRIVATE flag was not cleared after alloc_anon_inode(), causing
LSM/SELinux checks to be bypassed for secretmem file descriptors.

As guest_memfd currently resides in the KVM module, we need to export this
symbol for use outside the core kernel. In the future, guest_memfd might be
moved to core-mm, at which point the symbols no longer would have to be
exported. When/if that happens is still unclear.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 66d29d757c968d2bee9124816da5d718eb352959
Version 2bfe15c5261212130f1a71f32a300bcf426443d4
Status affected
Version < e3eed01347721cd7a8819568161c91d538fbf229
Version 2bfe15c5261212130f1a71f32a300bcf426443d4
Status affected
Version < f94c422157f3e43dd31990567b3e5d54b3e5b32b
Version 2bfe15c5261212130f1a71f32a300bcf426443d4
Status affected
Version < 6ca45ea48530332a4ba09595767bd26d3232743b
Version 2bfe15c5261212130f1a71f32a300bcf426443d4
Status affected
Version < cbe4134ea4bc493239786220bd69cb8a13493190
Version 2bfe15c5261212130f1a71f32a300bcf426443d4
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.0
Status affected
Version < 6.0
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.146
Status unaffected
Version <= 6.6.*
Version 6.6.97
Status unaffected
Version <= 6.12.*
Version 6.12.37
Status unaffected
Version <= 6.15.*
Version 6.15.6
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.061
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string