๐Ÿ” CVE Alert

CVE-2025-38058

UNKNOWN 0.0

__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock ... or we risk stealing final mntput from sync umount - raising mnt_count after umount(2) has verified that victim is not busy, but before it has set MNT_SYNC_UMOUNT; in that case __legitimize_mnt() doesn't see that it's safe to quietly undo mnt_count increment and leaves dropping the reference to caller, where it'll be a full-blown mntput(). Check under mount_lock is needed; leaving the current one done before taking that makes no sense - it's nowhere near common enough to bother with.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 18, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
48a066e72d970a3e225a9c18690d570c736fc455 < 628fb00195ce21a90cf9e4e3d105cd9e58f77b40 48a066e72d970a3e225a9c18690d570c736fc455 < b89eb56a378b7b2c1176787fc228d0a57172bdd5 48a066e72d970a3e225a9c18690d570c736fc455 < f6d45fd92f62845cbd1eb5128fd8f0ed7d0c5a42 48a066e72d970a3e225a9c18690d570c736fc455 < 9b0915e72b3cf52474dcee0b24a2f99d93e604a3 48a066e72d970a3e225a9c18690d570c736fc455 < d8ece4ced3b051e656c77180df2e69e19e24edc1 48a066e72d970a3e225a9c18690d570c736fc455 < 8cafd7266fa02e0863bacbf872fe635c0b9725eb 48a066e72d970a3e225a9c18690d570c736fc455 < b55996939c71a3e1a38f3cdc6a8859797efc9083 48a066e72d970a3e225a9c18690d570c736fc455 < 250cf3693060a5f803c5f1ddc082bb06b16112a9
Linux / Linux
3.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/628fb00195ce21a90cf9e4e3d105cd9e58f77b40 git.kernel.org: https://git.kernel.org/stable/c/b89eb56a378b7b2c1176787fc228d0a57172bdd5 git.kernel.org: https://git.kernel.org/stable/c/f6d45fd92f62845cbd1eb5128fd8f0ed7d0c5a42 git.kernel.org: https://git.kernel.org/stable/c/9b0915e72b3cf52474dcee0b24a2f99d93e604a3 git.kernel.org: https://git.kernel.org/stable/c/d8ece4ced3b051e656c77180df2e69e19e24edc1 git.kernel.org: https://git.kernel.org/stable/c/8cafd7266fa02e0863bacbf872fe635c0b9725eb git.kernel.org: https://git.kernel.org/stable/c/b55996939c71a3e1a38f3cdc6a8859797efc9083 git.kernel.org: https://git.kernel.org/stable/c/250cf3693060a5f803c5f1ddc082bb06b16112a9 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html