Description
In the Linux kernel, the following vulnerability has been resolved:

landlock: Fix handling of disconnected directories

Disconnected files or directories can appear when they are visible and
opened from a bind mount, but have been renamed or moved from the source
of the bind mount in a way that makes them inaccessible from the mount
point (i.e. out of scope).

Previously, access rights tied to files or directories opened through a
disconnected directory were collected by walking the related hierarchy
down to the root of the filesystem, without taking into account the
mount point because it couldn't be found. This could lead to
inconsistent access results, potential access right widening, and
hard-to-debug renames, especially since such paths cannot be printed.

For a sandboxed task to create a disconnected directory, it needs to
have write access (i.e. FS_MAKE_REG, FS_REMOVE_FILE, and FS_REFER) to
the underlying source of the bind mount, and read access to the related
mount point. Because a sandboxed task cannot acquire more access
rights than those defined by its Landlock domain, this could lead to
inconsistent access rights due to missing permissions that should be
inherited from the mount point hierarchy, while inheriting permissions
from the filesystem hierarchy hidden by this mount point instead.

Landlock now handles files and directories opened from disconnected
directories by taking into account the filesystem hierarchy when the
mount point is not found in the hierarchy walk, and also always taking
into account the mount point from which these disconnected directories
were opened. This ensures that a rename is not allowed if it would
widen access rights [1].

The rationale is that, even if disconnected hierarchies might not be
visible or accessible to a sandboxed task, relying on the collected
access rights from them improves the guarantee that access rights will
not be widened during a rename because of the access right comparison
between the source and the destination (see LANDLOCK_ACCESS_FS_REFER).
It may look like this would grant more access on disconnected files and
directories, but the security policies are always enforced for all the
evaluated hierarchies. This new behavior should be less surprising to
users and safer from an access control perspective.

Remove a wrong WARN_ON_ONCE() canary in collect_domain_accesses() and
fix the related comment.

Because opened files have their access rights stored in the related file
security properties, there is no impact for disconnected or unlinked
files.
Published: 2025-12-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation within sandboxed tasks
Action: Apply patch
AI Analysis

Impact

The Linux kernel Landlock subsystem contained a flaw that improperly handled files and directories opened from disconnected directories. When a sandboxed process accessed a bind mount that had been renamed or moved such that the target became invisible from the mount point, the kernel incorrectly accumulated access rights by walking the source filesystem hierarchy without accounting for the mount point. This caused inconsistent and potentially wider access results, allowing a sandboxed task with limited write and read permissions to acquire additional capabilities beyond those intended by its Landlock domain. The vulnerability represents an improper access control weakness that can lead to unintentional privilege escalation inside a sandboxed environment.

Affected Systems

All installations of the Linux kernel that use the Landlock file‑system security module. The vulnerability affects any kernel configuration that enables Landlock; specific patched kernels are identified by the patch commit referenced in the advisory, but no version range is presently supplied in the official data.

Risk and Exploitability

The CVSS score of 5.5 indicates a medium severity. The EPSS score of less than 1% suggests that the probability of exploitation in the wild is currently very low. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a local sandboxed task that has write access (FS_MAKE_REG, FS_REMOVE_FILE, FS_REFER) to the source of a bind mount and read access to the mount point; by performing a rename that crosses the mount boundary, the task could obtain a broader set of permissions than originally intended. Immediate patching of the kernel mitigates the risk, and in environments where patching is delayed, restricting the sandbox’s ability to create bind mounts or reducing its write privileges can help prevent the exploit. The mitigations are most effective when applied before any untrusted process is granted Landlock privileges that interact with bind mounts.

Generated by OpenCVE AI on April 27, 2026 at 22:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that incorporates the CVE-2025-68736 fix, ensuring that the Landlock subsystem correctly rejects renames that would widen access rights.
  • If an immediate kernel update is not feasible, limit sandboxed tasks from creating bind mounts or remove write permissions to the source of existing bind mounts, thereby preventing discovery of disconnected directories.
  • Reconfigure or tighten Landlock policies to disallow FS_REFER actions on paths that involve mount points, ensuring that access rights are fully inherited from the appropriate filesystem hierarchy.
  • In environments that must continue to use older kernels, monitor for unexpected sandboxed task behaviors and consider deploying additional host‑level controls such as SELinux or AppArmor to restrict file operations on bind mounts.

Generated by OpenCVE AI on April 27, 2026 at 22:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-8177-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8177-2 Linux kernel (Real-time) vulnerabilities
Ubuntu USN Ubuntu USN USN-8183-1 Linux kernel (GCP) vulnerabilities
Ubuntu USN Ubuntu USN USN-8183-2 Linux kernel vulnerabilities
History

Mon, 27 Apr 2026 22:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284

Thu, 02 Apr 2026 11:45:00 +0000


Thu, 25 Dec 2025 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Wed, 24 Dec 2025 12:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: landlock: Fix handling of disconnected directories Disconnected files or directories can appear when they are visible and opened from a bind mount, but have been renamed or moved from the source of the bind mount in a way that makes them inaccessible from the mount point (i.e. out of scope). Previously, access rights tied to files or directories opened through a disconnected directory were collected by walking the related hierarchy down to the root of the filesystem, without taking into account the mount point because it couldn't be found. This could lead to inconsistent access results, potential access right widening, and hard-to-debug renames, especially since such paths cannot be printed. For a sandboxed task to create a disconnected directory, it needs to have write access (i.e. FS_MAKE_REG, FS_REMOVE_FILE, and FS_REFER) to the underlying source of the bind mount, and read access to the related mount point. Because a sandboxed task cannot acquire more access rights than those defined by its Landlock domain, this could lead to inconsistent access rights due to missing permissions that should be inherited from the mount point hierarchy, while inheriting permissions from the filesystem hierarchy hidden by this mount point instead. Landlock now handles files and directories opened from disconnected directories by taking into account the filesystem hierarchy when the mount point is not found in the hierarchy walk, and also always taking into account the mount point from which these disconnected directories were opened. This ensures that a rename is not allowed if it would widen access rights [1]. The rationale is that, even if disconnected hierarchies might not be visible or accessible to a sandboxed task, relying on the collected access rights from them improves the guarantee that access rights will not be widened during a rename because of the access right comparison between the source and the destination (see LANDLOCK_ACCESS_FS_REFER). It may look like this would grant more access on disconnected files and directories, but the security policies are always enforced for all the evaluated hierarchies. This new behavior should be less surprising to users and safer from an access control perspective. Remove a wrong WARN_ON_ONCE() canary in collect_domain_accesses() and fix the related comment. Because opened files have their access rights stored in the related file security properties, there is no impact for disconnected or unlinked files.
Title landlock: Fix handling of disconnected directories
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-02T11:30:46.042Z

Reserved: 2025-12-24T10:30:51.029Z

Link: CVE-2025-68736

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2025-12-24T13:16:28.550

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-68736

cve-icon Redhat

Severity : Low

Publid Date: 2025-12-24T00:00:00Z

Links: CVE-2025-68736 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T22:15:15Z

Weaknesses