CVE-2025-38306 – Linux Kernel Namespace Semaphores Race Condition Vulnerability

The following table lists the changes that have been made to the
CVE-2025-38306 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Jul. 10, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved:

    fs/fhandle.c: fix a race in call of has_locked_children()

    may_decode_fh() is calling has_locked_children() while holding no locks.
    That’s an oopsable race…

    The rest of the callers are safe since they are holding namespace_sem and
    are guaranteed a positive refcount on the mount in question.

    Rename the current has_locked_children() to __has_locked_children(), make
    it static and switch the fs/namespace.c users to it.

    Make has_locked_children() a wrapper for __has_locked_children(), calling
    the latter under read_seqlock_excl(&mount_lock).

    Added Reference https://git.kernel.org/stable/c/1f282cdc1d219c4a557f7009e81bc792820d9d9a
    Added Reference https://git.kernel.org/stable/c/287c7d34eedd37af1272dfb3b6e8656f4f026424
Share the Post:

Related Posts