CVE-2025-68788
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's fsnotify system generating ACCESS and MODIFY events on child special files (like /dev/null) for users who do not have read access to those files but do have read access to the parent directory. Normally, users without read access cannot subscribe to such events on files, but they could subscribe to events on children if they had access to the parent directory. This allowed users to infer file access or modification indirectly via event notifications or atime/mtime changes, creating a side-channel for potential information leakage. The fix aligns fsnotify behavior with stat behavior by not generating ACCESS/MODIFY events on special files for parent watchers, closing this side-channel.
How can this vulnerability impact me? :
This vulnerability can allow users without direct read access to special files to infer when those files are accessed or modified by monitoring event notifications or timestamp changes. This side-channel could be exploited to exfiltrate information or monitor system activity that should be restricted, potentially leading to unauthorized information disclosure.