CVE-2025-68183
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's Integrity Measurement Architecture (IMA) when both IMA and Extended Verification Module (EVM) are in fix mode. If a program first stores an IMA signature in the security.ima extended attribute and then writes or removes another security extended attribute (like security.selinux or security.evm), the IMA_DIGSIG flag is incorrectly cleared. This causes the IMA signature to be replaced by an IMA hash when the file is closed, which means the original IMA signature is lost or reset improperly. The vulnerability allows the IMA file signature to be replaced with a less secure hash due to the flag being reset during certain xattr operations.
How can this vulnerability impact me? :
This vulnerability can impact you by causing the loss or replacement of the original IMA file signature with a weaker IMA hash when modifying certain security extended attributes on files. This undermines the integrity verification of files, potentially allowing unauthorized or unverified changes to go undetected, which could weaken system security and trust in file integrity measurements.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking if the IMA signature is being reset to an IMA hash when setting or removing non-IMA extended attributes (xattr) such as security.selinux, security.evm, or ACLs on files. One way to observe this is by using the command: # getfattr -m - -d -e hex /usr/bin/bash to inspect the security.ima attribute. If the IMA_DIGSIG flag is cleared improperly, the IMA signature will be replaced by a hash upon file close. Additionally, reproducing the issue can be done by setting security.ima and then setting or removing other security xattrs as shown in the provided minimal C code example.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that your Linux kernel is updated to a version where the issue is resolved, which prevents the IMA_DIGSIG flag from being cleared when setting or removing non-IMA extended attributes. In the meantime, avoid operations that set or remove non-IMA xattrs like security.selinux, security.evm, or ACLs on files that have IMA signatures until the kernel is patched. Also, boot the kernel with appropriate parameters such as "ima_appraise=fix evm=fix ima_policy=appraise_tcb" and use tools like rpm-plugin-ima carefully to avoid triggering the issue.