CVE-2025-68740
Improper Error Handling in Linux IMA Causes False File Measurement
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's Integrity Measurement Architecture (IMA) subsystem. Specifically, in the function ima_match_rules(), an error code returned by ima_filter_rule_match() is not handled correctly. When ima_filter_rule_match() returns -ENOENT because a rule is NULL, the code mistakenly treats this as a successful match, causing extra files to be measured by IMA. This happens particularly after unloading the SELinux policy module, where the rule becomes NULL and the error bypasses the intended check, resulting in a false positive match.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel's IMA subsystem to incorrectly measure additional files that should not be measured. This could lead to inaccurate integrity measurements and potentially affect security monitoring or enforcement mechanisms relying on IMA, possibly allowing unintended files to be considered trusted or verified.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by updating the Linux kernel to a version where the ima_match_rules() function has been corrected to handle error codes properly (changing 'if (!rc)' to 'if (rc <= 0)'). Therefore, the immediate step to mitigate this vulnerability is to update or patch your Linux kernel to the fixed version that includes this correction.