PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-71239 Linux CVE debrief

CVE-2025-71239 is a Linux kernel audit coverage issue where fchmodat2() was not included in the audit change-attributes class. As described in the CVE record, that omission meant a file attribute change performed with fchmodat2() could evade audit rules that would otherwise apply to chmod() or fchmodat(). The issue was publicly recorded on 2026-03-17 and later updated on 2026-05-20, with stable-kernel patch references listed in NVD.

Vendor
Linux
Product
Unknown
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-03-17
Original CVE updated
2026-05-20
Advisory published
2026-03-17
Advisory updated
2026-05-20

Who should care

Kernel maintainers, distro security teams, and operators who rely on Linux audit rules for change-attribute monitoring should care. Security monitoring teams should also review whether their deployed kernels fall within the affected version ranges.

Technical summary

The vulnerability is a syscall coverage gap in Linux audit. fchmodat2(), introduced in Linux 6.6, was not mapped into the audit change-attributes class, so file attribute changes using that syscall could bypass audit rules intended to capture attribute modifications. NVD lists affected kernel ranges as 6.6 before 6.6.128, 6.7 before 6.12.75, 6.13 before 6.18.16, and 6.19 before 6.19.6. The CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating a locally reachable issue requiring low privileges and no user interaction.

Defensive priority

Medium. This is not a remote code execution flaw, but it can undermine security monitoring and audit completeness on affected kernels. Environments that depend on audit-based detection or compliance evidence should prioritize patching and validation.

Recommended defensive actions

  • Confirm whether your Linux kernel version falls within any of the affected ranges listed in NVD.
  • Apply the relevant stable kernel updates that include the audit fix for fchmodat2().
  • Review audit rules and test that attribute-change events are captured as expected after patching.
  • If you operate compliance or monitoring tooling, verify that your detections do not assume chmod() and fchmodat() are the only attribute-changing paths.
  • Track distro advisories for backported fixes if you do not run upstream kernel versions.

Evidence notes

This debrief is based on the NVD CVE record, the CVE description supplied in the source corpus, the listed affected CPE version ranges, the CVSS vector, and the referenced stable-kernel patch links. A third-party advisory is listed by NVD, but no external content beyond the supplied metadata was used here.

Official resources

Public CVE record published on 2026-03-17 and modified on 2026-05-20. NVD marks the issue as analyzed and links stable kernel patches as remediation references.