Linux Kernel Vulnerability in Netlink Binding Mechanism
CVE-2025-39926

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
1 October 2025

What is CVE-2025-39926?

In the Linux kernel, a vulnerability in the netlink binding mechanism arose due to inadequate capability checks. Specifically, the genl_bind() function allowed bind() callbacks to be executed even when the necessary permissions were denied, indicated by a return value of -EPERM. This flaw could enable unauthorized users to inadvertently trigger callbacks intended for legitimate callers, leading to potential security breaches. The issue has been rectified by ensuring that bind() is only invoked after successful permission verification, thus safeguarding the kernel from such unauthorized access.

Affected Version(s)

Linux 3de21a8990d3c2cc507e9cc4ed00f36358d5b93e < 98c9d884047a3051c203708914a874dece3cbe54

Linux 3de21a8990d3c2cc507e9cc4ed00f36358d5b93e < 8858c1e9405906c09589d7c336f04058ea198207

Linux 3de21a8990d3c2cc507e9cc4ed00f36358d5b93e < 1dbfb0363224f6da56f6655d596dc5097308d6f5

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-39926 : Linux Kernel Vulnerability in Netlink Binding Mechanism