{"id":"CVE-2025-68239","summary":"binfmt_misc: restore write access before closing files opened by open_exec()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbinfmt_misc: restore write access before closing files opened by open_exec()\n\nbm_register_write() opens an executable file using open_exec(), which\ninternally calls do_open_execat() and denies write access on the file to\navoid modification while it is being executed.\n\nHowever, when an error occurs, bm_register_write() closes the file using\nfilp_close() directly. This does not restore the write permission, which\nmay cause subsequent write operations on the same file to fail.\n\nFix this by calling exe_file_allow_write_access() before filp_close() to\nrestore the write permission properly.","modified":"2026-04-02T13:03:24.877717Z","published":"2025-12-16T14:21:16.889Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20145-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68239.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/480ac88431703f2adbb8e6b5bd73c3f3cf9f3d7f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6cce7bc7fac8471c832696720d9c8f2a976d9c54"},{"type":"WEB","url":"https://git.kernel.org/stable/c/90f601b497d76f40fa66795c3ecf625b6aced9fd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e785f552ab04dbca01d31f0334f4561240b04459"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fbab8c08e1a6dbaef81e22d672a7647553101d16"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68239.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68239"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e7850f4d844e0acfac7e570af611d89deade3146"},{"fixed":"480ac88431703f2adbb8e6b5bd73c3f3cf9f3d7f"},{"fixed":"fbab8c08e1a6dbaef81e22d672a7647553101d16"},{"fixed":"6cce7bc7fac8471c832696720d9c8f2a976d9c54"},{"fixed":"e785f552ab04dbca01d31f0334f4561240b04459"},{"fixed":"90f601b497d76f40fa66795c3ecf625b6aced9fd"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"467a50d5db7deaf656e18a1f633be9ecd94b393a"},{"last_affected":"4a8b4124ea4156ca52918b66c750a69c6d932aa5"},{"last_affected":"3fe116e33a855bbfdd32dc207e9be2a41e3ed3a6"},{"last_affected":"c0e0ab60d0b15469e69db93215dad009999f5a5b"},{"last_affected":"5ab9464a2a3c538eedbb438f1802f2fd98d0953f"},{"last_affected":"d28492be82e19fc69cc69975fc2052b37ef0c821"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68239.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.12.0"},{"fixed":"6.1.167"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.130"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.78"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.9"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68239.json"}}],"schema_version":"1.7.5"}