CVE-2025-39926

In the Linux kernel, the following vulnerability has been resolved: genetlink: fix genl_bind() invoking bind() after -EPERM Per family bind/unbind callbacks were introduced to allow families to track multicast group consumer presence, e.g. to start or stop producing events depending on listeners. However, in genl_bind() the bind() callback was invoked even if capability checks failed and ret was set to -EPERM. This means that callbacks could run on behalf of unauthorized callers while the syscall still returned failure to user space. Fix this by only invoking bind() after "if (ret) break;" check i.e. after permission checks have succeeded.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc5:*:*:*:*:*:*

History

11 Dec 2025, 18:24

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/1dbfb0363224f6da56f6655d596dc5097308d6f5 - () https://git.kernel.org/stable/c/1dbfb0363224f6da56f6655d596dc5097308d6f5 - Patch
References () https://git.kernel.org/stable/c/8858c1e9405906c09589d7c336f04058ea198207 - () https://git.kernel.org/stable/c/8858c1e9405906c09589d7c336f04058ea198207 - Patch
References () https://git.kernel.org/stable/c/98c9d884047a3051c203708914a874dece3cbe54 - () https://git.kernel.org/stable/c/98c9d884047a3051c203708914a874dece3cbe54 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.17:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
First Time Linux
Linux linux Kernel

01 Oct 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-01 08:15

Updated : 2025-12-11 18:24


NVD link : CVE-2025-39926

Mitre link : CVE-2025-39926

CVE.ORG link : CVE-2025-39926


JSON object : View

Products Affected

linux

  • linux_kernel