PatchSiren cyber security CVE debrief
CVE-2025-71239 Linux CVE debrief
CVE-2025-71239 is a Linux kernel audit coverage issue where fchmodat2() was not included in the audit change-attributes class. As described in the CVE record, that omission meant a file attribute change performed with fchmodat2() could evade audit rules that would otherwise apply to chmod() or fchmodat(). The issue was publicly recorded on 2026-03-17 and later updated on 2026-05-20, with stable-kernel patch references listed in NVD.
- Vendor
- Linux
- Product
- Unknown
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-03-17
- Original CVE updated
- 2026-05-20
- Advisory published
- 2026-03-17
- Advisory updated
- 2026-05-20
Who should care
Kernel maintainers, distro security teams, and operators who rely on Linux audit rules for change-attribute monitoring should care. Security monitoring teams should also review whether their deployed kernels fall within the affected version ranges.
Technical summary
The vulnerability is a syscall coverage gap in Linux audit. fchmodat2(), introduced in Linux 6.6, was not mapped into the audit change-attributes class, so file attribute changes using that syscall could bypass audit rules intended to capture attribute modifications. NVD lists affected kernel ranges as 6.6 before 6.6.128, 6.7 before 6.12.75, 6.13 before 6.18.16, and 6.19 before 6.19.6. The CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating a locally reachable issue requiring low privileges and no user interaction.
Defensive priority
Medium. This is not a remote code execution flaw, but it can undermine security monitoring and audit completeness on affected kernels. Environments that depend on audit-based detection or compliance evidence should prioritize patching and validation.
Recommended defensive actions
- Confirm whether your Linux kernel version falls within any of the affected ranges listed in NVD.
- Apply the relevant stable kernel updates that include the audit fix for fchmodat2().
- Review audit rules and test that attribute-change events are captured as expected after patching.
- If you operate compliance or monitoring tooling, verify that your detections do not assume chmod() and fchmodat() are the only attribute-changing paths.
- Track distro advisories for backported fixes if you do not run upstream kernel versions.
Evidence notes
This debrief is based on the NVD CVE record, the CVE description supplied in the source corpus, the listed affected CPE version ranges, the CVSS vector, and the referenced stable-kernel patch links. A third-party advisory is listed by NVD, but no external content beyond the supplied metadata was used here.
Official resources
-
CVE-2025-71239 CVE record
CVE.org
-
CVE-2025-71239 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Third Party Advisory
Public CVE record published on 2026-03-17 and modified on 2026-05-20. NVD marks the issue as analyzed and links stable kernel patches as remediation references.