Impact
The vulnerability stems from an insufficient permission check when opening namespace handles in the Linux nsfs filesystem. Based on the description, privileged services are able to open handles to other privileged services' namespaces, which they should not be able to. This results in unintended visibility of namespace information, effectively leaking metadata about other services' namespaces. The issue is an example of improper access control and a permission or privilege issue (CWE‑1220).
Affected Systems
All Linux kernel installations that have not yet applied the fix are affected. The change is identified in the kernel source, and any kernel version preceding that commit may allow the described permission bypass. Linux is the vendor, and the product is the Linux kernel, although no specific version range is listed.
Risk and Exploitability
The lack of an EPSS score and KEV listing indicates that no widespread exploitation is known, but the vulnerability still poses a risk to environments where multiple privileged services coexist. An attacker with the ability to launch a privileged service could gather information about other services, potentially aiding further attacks. The exploitation path requires kernel privilege; therefore the risk is moderate but non‑negligible for production systems.
OpenCVE Enrichment