CVE-2025-38396

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/07/2025
Last modified:
23/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass<br /> <br /> Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create<br /> anonymous inodes with proper security context. This replaces the current<br /> pattern of calling alloc_anon_inode() followed by<br /> inode_init_security_anon() for creating security context manually.<br /> <br /> This change also fixes a security regression in secretmem where the<br /> S_PRIVATE flag was not cleared after alloc_anon_inode(), causing<br /> LSM/SELinux checks to be bypassed for secretmem file descriptors.<br /> <br /> As guest_memfd currently resides in the KVM module, we need to export this<br /> symbol for use outside the core kernel. In the future, guest_memfd might be<br /> moved to core-mm, at which point the symbols no longer would have to be<br /> exported. When/if that happens is still unclear.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.0 (including) 6.1.146 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.97 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.37 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.6 (excluding)
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*