CVE-2025-38498

In the Linux kernel, the following vulnerability has been resolved: do_change_type(): refuse to operate on unmounted/not ours mounts Ensure that propagation settings can only be changed for mounts located in the caller's mount namespace. This change aligns permission checking with the rest of mount(2).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 16:26

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/064014f7812744451d5d0592f3d2bcd727f2ee93 - () https://git.kernel.org/stable/c/064014f7812744451d5d0592f3d2bcd727f2ee93 - Patch
References () https://git.kernel.org/stable/c/12f147ddd6de7382dad54812e65f3f08d05809fc - () https://git.kernel.org/stable/c/12f147ddd6de7382dad54812e65f3f08d05809fc - Patch
References () https://git.kernel.org/stable/c/19554c79a2095ddde850906a067915c1ef3a4114 - () https://git.kernel.org/stable/c/19554c79a2095ddde850906a067915c1ef3a4114 - Patch
References () https://git.kernel.org/stable/c/432a171d60056489270c462e651e6c3a13f855b1 - () https://git.kernel.org/stable/c/432a171d60056489270c462e651e6c3a13f855b1 - Patch
References () https://git.kernel.org/stable/c/4f091ad0862b02dc42a19a120b7048de848561f8 - () https://git.kernel.org/stable/c/4f091ad0862b02dc42a19a120b7048de848561f8 - Patch
References () https://git.kernel.org/stable/c/787937c4e373f1722c4343e5a5a4eb0f8543e589 - () https://git.kernel.org/stable/c/787937c4e373f1722c4343e5a5a4eb0f8543e589 - Patch
References () https://git.kernel.org/stable/c/9c1ddfeb662b668fff69c5f1cfdd9f5d23d55d23 - () https://git.kernel.org/stable/c/9c1ddfeb662b668fff69c5f1cfdd9f5d23d55d23 - Patch
References () https://git.kernel.org/stable/c/c7d11fdf8e5db5f34a6c062c7e6ba3a0971879d2 - () https://git.kernel.org/stable/c/c7d11fdf8e5db5f34a6c062c7e6ba3a0971879d2 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

31 Jul 2025, 18:42

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: do_change_type(): se niega a operar en montajes no montados o que no son nuestros. Garantiza que la configuración de propagación solo se pueda cambiar para los montajes ubicados en el espacio de nombres de montaje del invocador. Este cambio alinea la comprobación de permisos con el resto de mount(2).

30 Jul 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-30 06:15

Updated : 2026-01-07 16:26


NVD link : CVE-2025-38498

Mitre link : CVE-2025-38498

CVE.ORG link : CVE-2025-38498


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel