5.5
CVE-2025-38499
- EPSS 0.02%
- Veröffentlicht 11.08.2025 16:15:30
- Zuletzt bearbeitet 07.01.2026 16:26:47
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns What we want is to verify there is that clone won't expose something hidden by a mount we wouldn't be able to undo. "Wouldn't be able to undo" may be a result of MNT_LOCKED on a child, but it may also come from lacking admin rights in the userns of the namespace mount belongs to. clone_private_mnt() checks the former, but not the latter. There's a number of rather confusing CAP_SYS_ADMIN checks in various userns during the mount, especially with the new mount API; they serve different purposes and in case of clone_private_mnt() they usually, but not always end up covering the missing check mentioned above.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 4.4.281 < 4.5
Linux ≫ Linux Kernel Version >= 4.9.280 < 4.10
Linux ≫ Linux Kernel Version >= 4.14.244 < 4.15
Linux ≫ Linux Kernel Version >= 4.19.204 < 4.20
Linux ≫ Linux Kernel Version >= 5.4.141 < 5.5
Linux ≫ Linux Kernel Version >= 5.10.59 < 5.11
Linux ≫ Linux Kernel Version >= 5.13.11 < 5.14
Linux ≫ Linux Kernel Version >= 5.14.1 < 5.15.190
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.147
Linux ≫ Linux Kernel Version >= 6.2 < 6.6.100
Linux ≫ Linux Kernel Version >= 6.7 < 6.12.40
Linux ≫ Linux Kernel Version >= 6.13 < 6.15.3
Linux ≫ Linux Kernel Version5.14 Update-
Linux ≫ Linux Kernel Version5.14 Updaterc6
Linux ≫ Linux Kernel Version5.14 Updaterc7
Debian ≫ Debian Linux Version11.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.022 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|