Количество 30
Количество 30
CVE-2025-38396
In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear.
CVE-2025-38396
In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear.
CVE-2025-38396
In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear.
CVE-2025-38396
fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass
CVE-2025-38396
In the Linux kernel, the following vulnerability has been resolved: f ...
GHSA-8m46-hm8p-v8rj
In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear.
BDU:2025-10787
Уязвимость функции anon_inode_make_secure_inode() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
RLSA-2025:16904
Moderate: kernel security update
ELSA-2025-16904
ELSA-2025-16904: kernel security update (MODERATE)
SUSE-SU-2025:3772-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7)
SUSE-SU-2025:3764-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6)
SUSE-SU-2025:03646-1
Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP7)
SUSE-SU-2025:3771-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7)
SUSE-SU-2025:3762-1
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6)
SUSE-SU-2025:3755-1
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6)
SUSE-SU-2025:03650-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7)
SUSE-SU-2025:3768-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)
SUSE-SU-2025:3765-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7)
SUSE-SU-2025:3748-1
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6)
SUSE-SU-2025:03638-1
Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-38396 In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear. | 0% Низкий | 3 месяца назад | ||
CVE-2025-38396 In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear. | CVSS3: 6 | 0% Низкий | 3 месяца назад | |
CVE-2025-38396 In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear. | 0% Низкий | 3 месяца назад | ||
CVE-2025-38396 fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass | CVSS3: 5.5 | 0% Низкий | 2 месяца назад | |
CVE-2025-38396 In the Linux kernel, the following vulnerability has been resolved: f ... | 0% Низкий | 3 месяца назад | ||
GHSA-8m46-hm8p-v8rj In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for creating security context manually. This change also fixes a security regression in secretmem where the S_PRIVATE flag was not cleared after alloc_anon_inode(), causing LSM/SELinux checks to be bypassed for secretmem file descriptors. As guest_memfd currently resides in the KVM module, we need to export this symbol for use outside the core kernel. In the future, guest_memfd might be moved to core-mm, at which point the symbols no longer would have to be exported. When/if that happens is still unclear. | 0% Низкий | 3 месяца назад | ||
BDU:2025-10787 Уязвимость функции anon_inode_make_secure_inode() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7 | 0% Низкий | 5 месяцев назад | |
RLSA-2025:16904 Moderate: kernel security update | 28 дней назад | |||
ELSA-2025-16904 ELSA-2025-16904: kernel security update (MODERATE) | около 1 месяца назад | |||
SUSE-SU-2025:3772-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7) | 12 дней назад | |||
SUSE-SU-2025:3764-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6) | 12 дней назад | |||
SUSE-SU-2025:03646-1 Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP7) | 17 дней назад | |||
SUSE-SU-2025:3771-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7) | 12 дней назад | |||
SUSE-SU-2025:3762-1 Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6) | 12 дней назад | |||
SUSE-SU-2025:3755-1 Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6) | 12 дней назад | |||
SUSE-SU-2025:03650-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7) | 18 дней назад | |||
SUSE-SU-2025:3768-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | 12 дней назад | |||
SUSE-SU-2025:3765-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) | 12 дней назад | |||
SUSE-SU-2025:3748-1 Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) | 13 дней назад | |||
SUSE-SU-2025:03638-1 Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) | 18 дней назад |
Уязвимостей на страницу