5.5
CVE-2025-38499
- EPSS 0.03%
- Veröffentlicht 11.08.2025 16:15:30
- Zuletzt bearbeitet 12.05.2026 13:16:51
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns
In the Linux kernel, the following vulnerability has been resolved: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns What we want is to verify there is that clone won't expose something hidden by a mount we wouldn't be able to undo. "Wouldn't be able to undo" may be a result of MNT_LOCKED on a child, but it may also come from lacking admin rights in the userns of the namespace mount belongs to. clone_private_mnt() checks the former, but not the latter. There's a number of rather confusing CAP_SYS_ADMIN checks in various userns during the mount, especially with the new mount API; they serve different purposes and in case of clone_private_mnt() they usually, but not always end up covering the missing check mentioned above.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 4.4.281 < 4.5
Linux ≫ Linux Kernel Version >= 4.9.280 < 4.10
Linux ≫ Linux Kernel Version >= 4.14.244 < 4.15
Linux ≫ Linux Kernel Version >= 4.19.204 < 4.20
Linux ≫ Linux Kernel Version >= 5.4.141 < 5.5
Linux ≫ Linux Kernel Version >= 5.10.59 < 5.11
Linux ≫ Linux Kernel Version >= 5.13.11 < 5.14
Linux ≫ Linux Kernel Version >= 5.14.1 < 5.15.190
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.147
Linux ≫ Linux Kernel Version >= 6.2 < 6.6.100
Linux ≫ Linux Kernel Version >= 6.7 < 6.12.40
Linux ≫ Linux Kernel Version >= 6.13 < 6.15.3
Linux ≫ Linux Kernel Version5.14 Update-
Linux ≫ Linux Kernel Version5.14 Updaterc6
Linux ≫ Linux Kernel Version5.14 Updaterc7
Debian ≫ Debian Linux Version11.0
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.075 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|