CVE-2025-39926Incorrect Privilege Assignment in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: genetlink: fix genl_bind() invoking bind() after -EPERM Per family bind/unbind callbacks were introduced to allow families to track multicast group consumer presence, e.g. to start or stop producing events depending on listeners. However, in genl_bind() the bind() callback was invoked even if capability checks failed and ret was set to -EPERM. This means that callbacks could run on behalf of unauthorized callers while the sys

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages7 packages

NVDlinux/linux_kernel6.96.12.48+2
Debianlinux/linux_kernel< 6.12.48-1+1
CVEListV5linux/linux3de21a8990d3c2cc507e9cc4ed00f36358d5b93e98c9d884047a3051c203708914a874dece3cbe54+3
debiandebian/linux< linux 6.16.8-1 (forky)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-f9wm-ppg2-pc92: In the Linux kernel, the following vulnerability has been resolved: genetlink: fix genl_bind() invoking bind() after -EPERM Per family bind/unbind c2025-10-01
OSV
CVE-2025-39926: In the Linux kernel, the following vulnerability has been resolved: genetlink: fix genl_bind() invoking bind() after -EPERM Per family bind/unbind cal2025-10-01

📋Vendor Advisories

3
Red Hat
kernel: Linux kernel: Denial of Service due to improper permission checks in genl_bind()2025-10-01
Debian
CVE-2025-39926: linux - In the Linux kernel, the following vulnerability has been resolved: genetlink: ...2025
Microsoft
Buffer overflow in the Bluetooth HCI_ISO dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file2021-11-09
CVE-2025-39926 — Incorrect Privilege Assignment | cvebase