๐Ÿ” CVE Alert

CVE-2025-39798

UNKNOWN 0.0

NFS: Fix the setting of capabilities when automounting a new filesystem

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix the setting of capabilities when automounting a new filesystem Capabilities cannot be inherited when we cross into a new filesystem. They need to be reset to the minimal defaults, and then probed for again.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 12, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
54ceac4515986030c2502960be620198dd8fe25b < 95eb0d97ab98a10e966125c1f274e7d0fc0992b3 54ceac4515986030c2502960be620198dd8fe25b < 73fcb101bb3eb2a552d7856a476b2c0bc3b5ef9e 54ceac4515986030c2502960be620198dd8fe25b < 3924dab90816d0c683a110628ef386f83a9d1e13 54ceac4515986030c2502960be620198dd8fe25b < 175afda783e38c0660f2afc0602dd9c83d4e7ee1 54ceac4515986030c2502960be620198dd8fe25b < 987c20428f067c1c7f29ed0a2bd8c63fa74b1c2c 54ceac4515986030c2502960be620198dd8fe25b < 816a6f60c2c2b679a33fa4276442bafd11473651 54ceac4515986030c2502960be620198dd8fe25b < a8ffee4abd8ec9d7a64d394e0306ae64ba139fd2 54ceac4515986030c2502960be620198dd8fe25b < 50e0fd0050e510e749e1fdd1d7158e419ff8f3b9 54ceac4515986030c2502960be620198dd8fe25b < b01f21cacde9f2878492cf318fee61bf4ccad323
Linux / Linux
2.6.19

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/95eb0d97ab98a10e966125c1f274e7d0fc0992b3 git.kernel.org: https://git.kernel.org/stable/c/73fcb101bb3eb2a552d7856a476b2c0bc3b5ef9e git.kernel.org: https://git.kernel.org/stable/c/3924dab90816d0c683a110628ef386f83a9d1e13 git.kernel.org: https://git.kernel.org/stable/c/175afda783e38c0660f2afc0602dd9c83d4e7ee1 git.kernel.org: https://git.kernel.org/stable/c/987c20428f067c1c7f29ed0a2bd8c63fa74b1c2c git.kernel.org: https://git.kernel.org/stable/c/816a6f60c2c2b679a33fa4276442bafd11473651 git.kernel.org: https://git.kernel.org/stable/c/a8ffee4abd8ec9d7a64d394e0306ae64ba139fd2 git.kernel.org: https://git.kernel.org/stable/c/50e0fd0050e510e749e1fdd1d7158e419ff8f3b9 git.kernel.org: https://git.kernel.org/stable/c/b01f21cacde9f2878492cf318fee61bf4ccad323 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html