CVE-2025-71239
Description
In the Linux kernel, the following vulnerability has been resolved:
audit: add fchmodat2() to change attributes class
fchmodat2(), introduced in version 6.6 is currently not in the change attribute class of audit. Calling fchmodat2() to change a file attribute in the same fashion than chmod() or fchmodat() will bypass audit rules such as:
-w /tmp/test -p rwa -k test_rwa
The current patch adds fchmodat2() to the change attributes class.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Linux kernel audit subsystem omitted fchmodat2() from the change-attributes class, allowing bypass of audit rules monitoring file attribute changes.
Vulnerability
Description The Linux kernel audit subsystem groups system calls into classes to enable filesystem watch rules (e.g., -p a for attribute changes). The fchmodat2() syscall, introduced in kernel version 6.6, was inadvertently omitted from the "change attributes" class. This means that any filesystem audit rule configured to monitor file attribute modifications (using permission a) would not trigger when fchmodat2() is used, unlike its counterparts chmod() or fchmodat() [1].
Exploitation and
Attack Surface An attacker with local access to the system can call fchmodat2() to modify file permissions without generating an audit event. No special privileges beyond the ability to invoke the syscall on files they can access are required. The bypass specifically affects audit rules that rely on system call class grouping, such as -w /tmp/test -p rwa -k test_rwa, which would otherwise log attribute changes [1].
Impact
Successful exploitation allows an attacker to stealthily alter file permissions (e.g., making a file executable or writable) without the action being recorded by the audit subsystem. This undermines the integrity of audit-based monitoring and compliance controls, potentially enabling further malicious activities to go undetected.
Mitigation
The Linux kernel has been patched by adding fchmodat2() to the chang_attrs class in the audit subsystem. Users are advised to update their kernels to versions containing the fix (stable commits referenced in the kernel repository). No workaround is available; only the kernel patch ensures that the syscall is properly audited [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Linux/Linuxv5Range: 6.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- git.kernel.org/stable/c/3e762a03713e8c25ca0108c075d662c897fc0623nvdPatch
- git.kernel.org/stable/c/4f493a6079b588cf1f04ce5ed6cdad45ab0d53dcnvdPatch
- git.kernel.org/stable/c/4fed776ca86378da7dd743a7b648e20b025ba8efnvdPatch
- git.kernel.org/stable/c/91e27bc79c3bca93c06bf5a471d47df9a35b3741nvdPatch
- git.kernel.org/stable/c/c4334c0d0e7d6f02ed93756fd4ba807e3d00c05fnvdPatch
- www.bencteux.fr/posts/missing_syscalls_audit/nvdThird Party Advisory
News mentions
0No linked articles in our index yet.