### [CVE-2025-38498](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38498) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=07b20889e3052c7e77d6a6a54e7e83446eb1ba84%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=2.6.15%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:do_change_type(): refuse to operate on unmounted/not ours mountsEnsure that propagation settings can only be changed for mounts locatedin the caller's mount namespace. This change aligns permission checkingwith the rest of mount(2). ### POC #### Reference No PoCs from references. #### Github - https://github.com/w4zu/Debian_security