CVE-2025-39798

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix the setting of capabilities when automounting a new filesystem Capabilities cannot be inherited when we cross into a new filesystem. They need to be reset to the minimal defaults, and then probed for again.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Jan 2026, 20:00

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/175afda783e38c0660f2afc0602dd9c83d4e7ee1 - () https://git.kernel.org/stable/c/175afda783e38c0660f2afc0602dd9c83d4e7ee1 - Patch
References () https://git.kernel.org/stable/c/3924dab90816d0c683a110628ef386f83a9d1e13 - () https://git.kernel.org/stable/c/3924dab90816d0c683a110628ef386f83a9d1e13 - Patch
References () https://git.kernel.org/stable/c/50e0fd0050e510e749e1fdd1d7158e419ff8f3b9 - () https://git.kernel.org/stable/c/50e0fd0050e510e749e1fdd1d7158e419ff8f3b9 - Patch
References () https://git.kernel.org/stable/c/73fcb101bb3eb2a552d7856a476b2c0bc3b5ef9e - () https://git.kernel.org/stable/c/73fcb101bb3eb2a552d7856a476b2c0bc3b5ef9e - Patch
References () https://git.kernel.org/stable/c/816a6f60c2c2b679a33fa4276442bafd11473651 - () https://git.kernel.org/stable/c/816a6f60c2c2b679a33fa4276442bafd11473651 - Patch
References () https://git.kernel.org/stable/c/95eb0d97ab98a10e966125c1f274e7d0fc0992b3 - () https://git.kernel.org/stable/c/95eb0d97ab98a10e966125c1f274e7d0fc0992b3 - Patch
References () https://git.kernel.org/stable/c/987c20428f067c1c7f29ed0a2bd8c63fa74b1c2c - () https://git.kernel.org/stable/c/987c20428f067c1c7f29ed0a2bd8c63fa74b1c2c - Patch
References () https://git.kernel.org/stable/c/a8ffee4abd8ec9d7a64d394e0306ae64ba139fd2 - () https://git.kernel.org/stable/c/a8ffee4abd8ec9d7a64d394e0306ae64ba139fd2 - Patch
References () https://git.kernel.org/stable/c/b01f21cacde9f2878492cf318fee61bf4ccad323 - () https://git.kernel.org/stable/c/b01f21cacde9f2878492cf318fee61bf4ccad323 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

12 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-12 16:15

Updated : 2026-01-16 20:00


NVD link : CVE-2025-39798

Mitre link : CVE-2025-39798

CVE.ORG link : CVE-2025-39798


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel