CVE-2025-68764
Description
In the Linux kernel, the following vulnerability has been resolved:
NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags
When a filesystem is being automounted, it needs to preserve the user-set superblock mount options, such as the "ro" flag.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel NFS automounts ignore user-set mount flags like ro, noexec, nodev, sync; fix ensures they are inherited.
Root
Cause
In the Linux kernel's NFS client, when a filesystem is automounted filesystem is created, the code failed to preserve user-specified superblock mount options such as ro, noexec, nodev, and sync. This meant that even if a user explicitly set these flags on the parent mount, the automounted subdirectory would not inherit them, potentially violating security expectations.
Attack
Vector
An attacker with the ability to trigger an NFS automount (e.g., by accessing a path that triggers an autofs map) could exploit this to bypass read-only restrictions or other mount constraints. No authentication is required beyond the ability to access the automount point; the vulnerability is in the kernel's handling of mount options during the automount process.
Impact
Impact
By not inheriting the ro flag, an flag, an automounted NFS filesystem could be writable even when the parent mount was intended to be read-only. Similarly, missing noexec, nodev, or sync` flags could allow execution of binaries, device node creation, or relaxed write ordering, undermining the security posture of the system.
Mitigation
The fix was applied to the Linux kernel stable tree via commits [1], [2], [3], and [4]. Users should update to a kernel version containing these patches containing these commits. No workaround is available other than avoiding automounts or applying the kernel patch.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/4b296944e632cf4c6a4cc8e2585c6451eae47b1bnvd
- git.kernel.org/stable/c/612cc98698d667df804792f0c47d4e501e66da29nvd
- git.kernel.org/stable/c/8675c69816e4276b979ff475ee5fac4688f80125nvd
- git.kernel.org/stable/c/a3dc6c40bcab1a888d5c0d134ccc0746b4c98929nvd
- git.kernel.org/stable/c/ba1495aefd22fcf0746a2a3025c95d766d7cde4dnvd
- git.kernel.org/stable/c/c09070b4def1b34e473a746c6a5331ccb80902c1nvd
- git.kernel.org/stable/c/dce10c59211e5cd763a62ea01e79b82a629811e3nvd
- git.kernel.org/stable/c/df9b003a2ecacc7218486fbb31fe008c93097d5fnvd
News mentions
0No linked articles in our index yet.