vulnerability

Alma Linux: CVE-2025-38499: Important: kernel security update (ALSA-2025-23241)

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Dec 16, 2025
Added
Jan 8, 2026
Modified
Jan 8, 2026

Description

In the Linux kernel, the following vulnerability has been resolved:

clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns

What we want is to verify there is that clone won't expose something
hidden by a mount we wouldn't be able to undo. "Wouldn't be able to undo"
may be a result of MNT_LOCKED on a child, but it may also come from
lacking admin rights in the userns of the namespace mount belongs to.

clone_private_mnt() checks the former, but not the latter.

There's a number of rather confusing CAP_SYS_ADMIN checks in various
userns during the mount, especially with the new mount API; they serve
different purposes and in case of clone_private_mnt() they usually,
but not always end up covering the missing check mentioned above.

Solutions

alma-upgrade-kernelalma-upgrade-kernel-64kalma-upgrade-kernel-64k-corealma-upgrade-kernel-64k-debugalma-upgrade-kernel-64k-debug-corealma-upgrade-kernel-64k-debug-develalma-upgrade-kernel-64k-debug-devel-matchedalma-upgrade-kernel-64k-debug-modulesalma-upgrade-kernel-64k-debug-modules-corealma-upgrade-kernel-64k-debug-modules-extraalma-upgrade-kernel-64k-develalma-upgrade-kernel-64k-devel-matchedalma-upgrade-kernel-64k-modulesalma-upgrade-kernel-64k-modules-corealma-upgrade-kernel-64k-modules-extraalma-upgrade-kernel-abi-stablelistsalma-upgrade-kernel-corealma-upgrade-kernel-cross-headersalma-upgrade-kernel-debugalma-upgrade-kernel-debug-corealma-upgrade-kernel-debug-develalma-upgrade-kernel-debug-devel-matchedalma-upgrade-kernel-debug-modulesalma-upgrade-kernel-debug-modules-corealma-upgrade-kernel-debug-modules-extraalma-upgrade-kernel-debug-uki-virtalma-upgrade-kernel-develalma-upgrade-kernel-devel-matchedalma-upgrade-kernel-docalma-upgrade-kernel-headersalma-upgrade-kernel-modulesalma-upgrade-kernel-modules-corealma-upgrade-kernel-modules-extraalma-upgrade-kernel-rtalma-upgrade-kernel-rt-64kalma-upgrade-kernel-rt-64k-corealma-upgrade-kernel-rt-64k-debugalma-upgrade-kernel-rt-64k-debug-corealma-upgrade-kernel-rt-64k-debug-develalma-upgrade-kernel-rt-64k-debug-modulesalma-upgrade-kernel-rt-64k-debug-modules-corealma-upgrade-kernel-rt-64k-debug-modules-extraalma-upgrade-kernel-rt-64k-develalma-upgrade-kernel-rt-64k-modulesalma-upgrade-kernel-rt-64k-modules-corealma-upgrade-kernel-rt-64k-modules-extraalma-upgrade-kernel-rt-corealma-upgrade-kernel-rt-debugalma-upgrade-kernel-rt-debug-corealma-upgrade-kernel-rt-debug-develalma-upgrade-kernel-rt-debug-modulesalma-upgrade-kernel-rt-debug-modules-corealma-upgrade-kernel-rt-debug-modules-extraalma-upgrade-kernel-rt-develalma-upgrade-kernel-rt-modulesalma-upgrade-kernel-rt-modules-corealma-upgrade-kernel-rt-modules-extraalma-upgrade-kernel-toolsalma-upgrade-kernel-tools-libsalma-upgrade-kernel-tools-libs-develalma-upgrade-kernel-uki-virtalma-upgrade-kernel-uki-virt-addonsalma-upgrade-kernel-zfcpdumpalma-upgrade-kernel-zfcpdump-corealma-upgrade-kernel-zfcpdump-develalma-upgrade-kernel-zfcpdump-devel-matchedalma-upgrade-kernel-zfcpdump-modulesalma-upgrade-kernel-zfcpdump-modules-corealma-upgrade-kernel-zfcpdump-modules-extraalma-upgrade-libperfalma-upgrade-perfalma-upgrade-python3-perfalma-upgrade-rtlaalma-upgrade-rv
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.