CVE-2025-68788
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/01/2026
Last modified:
19/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
fsnotify: do not generate ACCESS/MODIFY events on child for special files<br />
<br />
inotify/fanotify do not allow users with no read access to a file to<br />
subscribe to events (e.g. IN_ACCESS/IN_MODIFY), but they do allow the<br />
same user to subscribe for watching events on children when the user<br />
has access to the parent directory (e.g. /dev).<br />
<br />
Users with no read access to a file but with read access to its parent<br />
directory can still stat the file and see if it was accessed/modified<br />
via atime/mtime change.<br />
<br />
The same is not true for special files (e.g. /dev/null). Users will not<br />
generally observe atime/mtime changes when other users read/write to<br />
special files, only when someone sets atime/mtime via utimensat().<br />
<br />
Align fsnotify events with this stat behavior and do not generate<br />
ACCESS/MODIFY events to parent watchers on read/write of special files.<br />
The events are still generated to parent watchers on utimensat(). This<br />
closes some side-channels that could be possibly used for information<br />
exfiltration [1].<br />
<br />
[1] https://snee.la/pdf/pubs/file-notification-attacks.pdf
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/635bc4def026a24e071436f4f356ea08c0eed6ff
- https://git.kernel.org/stable/c/6a7d7d96eeeab7af2bd01afbb3d9878a11a13d91
- https://git.kernel.org/stable/c/7a93edb23bcf07a3aaf8b598edfc2faa8fbcc0b6
- https://git.kernel.org/stable/c/82f7416bcbd951549e758d15fc1a96a5afc2e900
- https://git.kernel.org/stable/c/859bdf438f01d9aa7f84b09c1202d548c7cad9e8
- https://git.kernel.org/stable/c/df2711544b050aba703e6da418c53c7dc5d443ca
- https://git.kernel.org/stable/c/e0643d46759db8b84c0504a676043e5e341b6c81



