Логотип exploitDog
bind:CVE-2025-38396
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-38396

Количество 30

Количество 30

ubuntu логотип

CVE-2025-38396

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear.

EPSS: Низкий
redhat логотип

CVE-2025-38396

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2025-38396

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear.

EPSS: Низкий
msrc логотип

CVE-2025-38396

2 месяца назад

fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2025-38396

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: f ...

EPSS: Низкий
github логотип

GHSA-8m46-hm8p-v8rj

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear.

EPSS: Низкий
fstec логотип

BDU:2025-10787

5 месяцев назад

Уязвимость функции anon_inode_make_secure_inode() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
EPSS: Низкий
rocky логотип

RLSA-2025:16904

28 дней назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-16904

около 1 месяца назад

ELSA-2025-16904: kernel security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3772-1

12 дней назад

Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3764-1

12 дней назад

Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03646-1

17 дней назад

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3771-1

12 дней назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3762-1

12 дней назад

Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3755-1

12 дней назад

Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03650-1

18 дней назад

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3768-1

12 дней назад

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3765-1

12 дней назад

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3748-1

13 дней назад

Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03638-1

18 дней назад

Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-38396

In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear.

0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-38396

In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear.

CVSS3: 6
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-38396

In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear.

0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-38396

fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass

CVSS3: 5.5
0%
Низкий
2 месяца назад
debian логотип
CVE-2025-38396

In the Linux kernel, the following vulnerability has been resolved: f ...

0%
Низкий
3 месяца назад
github логотип
GHSA-8m46-hm8p-v8rj

In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear.

0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-10787

Уязвимость функции anon_inode_make_secure_inode() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
0%
Низкий
5 месяцев назад
rocky логотип
RLSA-2025:16904

Moderate: kernel security update

28 дней назад
oracle-oval логотип
ELSA-2025-16904

ELSA-2025-16904: kernel security update (MODERATE)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:3772-1

Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7)

12 дней назад
suse-cvrf логотип
SUSE-SU-2025:3764-1

Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6)

12 дней назад
suse-cvrf логотип
SUSE-SU-2025:03646-1

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP7)

17 дней назад
suse-cvrf логотип
SUSE-SU-2025:3771-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7)

12 дней назад
suse-cvrf логотип
SUSE-SU-2025:3762-1

Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6)

12 дней назад
suse-cvrf логотип
SUSE-SU-2025:3755-1

Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6)

12 дней назад
suse-cvrf логотип
SUSE-SU-2025:03650-1

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7)

18 дней назад
suse-cvrf логотип
SUSE-SU-2025:3768-1

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)

12 дней назад
suse-cvrf логотип
SUSE-SU-2025:3765-1

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7)

12 дней назад
suse-cvrf логотип
SUSE-SU-2025:3748-1

Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6)

13 дней назад
suse-cvrf логотип
SUSE-SU-2025:03638-1

Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6)

18 дней назад

Уязвимостей на страницу