Description
In the Linux kernel, the following vulnerability has been resolved:

audit: add fchmodat2() to change attributes class

fchmodat2(), introduced in version 6.6 is currently not in the change
attribute class of audit. Calling fchmodat2() to change a file
attribute in the same fashion than chmod() or fchmodat() will bypass
audit rules such as:

-w /tmp/test -p rwa -k test_rwa

The current patch adds fchmodat2() to the change attributes class.
Published: 2026-03-17
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Audit bypass and unauthorized attribute change
Action: Immediate Patch
AI Analysis

Impact

The Linux kernel audit subsystem omitted the fchmodat2() system call from its change‑attributes class when it was introduced in kernel 6.6. Calls to fchmodat2() can modify file permissions or attributes exactly as chmod() or fchmodat(), but because it was not audited the action is not logged by audit rules such as ‑w /tmp/file ‑p rwa ‑k test_rwa. This allows a user to change attributes on a file or directory without generating evidence in the audit trail, potentially facilitating tampering, privilege escalation, or post‑exploitation cover‑up. The weakness manifests as improper access control and incorrect permission assignment because the kernel does not enforce audit recording for a privileged function.

Affected Systems

Linux kernel versions that include fchmodat2() but do not yet apply the patch are vulnerable. This includes unpatched kernel 6.6 releases and any distribution shipping that version without the audit update. Kernels that have been upgraded to include the audit fix (e.g., patched 6.6.x releases) are no longer impacted.

Risk and Exploitability

The EPSS score is reported as less than 1 % and the vulnerability is not listed in the CISA KEV catalog, indicating a low probability of widespread exploitation. The flaw can be leveraged by any user who can invoke fchmodat2(), which is a standard system call, creating a post‑exploitation advantage in environments where audit integrity is critical. The lack of audit coverage does not allow remote exploitation, but local privilege escalation or tampering remains possible if the attacker can execute the system call with sufficient privileges.

Generated by OpenCVE AI on March 26, 2026 at 04:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a Linux kernel update that contains the fchmodat2() audit fix (e.g., upgrade to a patched 6.6.x release).
  • Verify that the audit change‑attributes class now lists fchmodat2() by inspecting auditctl -l output or audit configuration files.
  • If an immediate kernel upgrade is not feasible, restrict use of the fchmodat2() system call via a seccomp filter or a custom kernel module that blocks the call.
  • Continuously monitor audit logs for unexpected attribute changes and correlate any anomalies with recent system activity.

Generated by OpenCVE AI on March 26, 2026 at 04:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-532
CWE-640

Wed, 25 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-532
CWE-640

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-693

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-693

Wed, 18 Mar 2026 17:30:00 +0000


Wed, 18 Mar 2026 00:15:00 +0000


Tue, 17 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: audit: add fchmodat2() to change attributes class fchmodat2(), introduced in version 6.6 is currently not in the change attribute class of audit. Calling fchmodat2() to change a file attribute in the same fashion than chmod() or fchmodat() will bypass audit rules such as: -w /tmp/test -p rwa -k test_rwa The current patch adds fchmodat2() to the change attributes class.
Title audit: add fchmodat2() to change attributes class
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:02:29.886Z

Reserved: 2026-02-18T14:25:13.845Z

Link: CVE-2025-71239

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-17T10:15:59.010

Modified: 2026-03-18T17:16:04.707

Link: CVE-2025-71239

cve-icon Redhat

Severity :

Publid Date: 2026-03-17T00:00:00Z

Links: CVE-2025-71239 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:21:12Z

Weaknesses

No weakness.