CVE-2025-38430

In the Linux kernel, the following vulnerability has been resolved: nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request If the request being processed is not a v4 compound request, then examining the cstate can have undefined results. This patch adds a check that the rpc procedure being executed (rq_procinfo) is the NFSPROC4_COMPOUND procedure.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

22 Dec 2025, 21:54

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/1244f0b2c3cecd3f349a877006e67c9492b41807 - () https://git.kernel.org/stable/c/1244f0b2c3cecd3f349a877006e67c9492b41807 - Patch
References () https://git.kernel.org/stable/c/2c54bd5a380ebf646fb9efbc4ae782ff3a83a5af - () https://git.kernel.org/stable/c/2c54bd5a380ebf646fb9efbc4ae782ff3a83a5af - Patch
References () https://git.kernel.org/stable/c/425efc6b3292a3c79bfee4a1661cf043dcd9cf2f - () https://git.kernel.org/stable/c/425efc6b3292a3c79bfee4a1661cf043dcd9cf2f - Patch
References () https://git.kernel.org/stable/c/64a723b0281ecaa59d31aad73ef8e408a84cb603 - () https://git.kernel.org/stable/c/64a723b0281ecaa59d31aad73ef8e408a84cb603 - Patch
References () https://git.kernel.org/stable/c/7a75a956692aa64211a9e95781af1ec461642de4 - () https://git.kernel.org/stable/c/7a75a956692aa64211a9e95781af1ec461642de4 - Patch
References () https://git.kernel.org/stable/c/b1d0323a09a29f81572c7391e0d80d78724729c9 - () https://git.kernel.org/stable/c/b1d0323a09a29f81572c7391e0d80d78724729c9 - Patch
References () https://git.kernel.org/stable/c/bf78a2706ce975981eb5167f2d3b609eb5d24c19 - () https://git.kernel.org/stable/c/bf78a2706ce975981eb5167f2d3b609eb5d24c19 - Patch
References () https://git.kernel.org/stable/c/e7e943ddd1c6731812357a28e7954ade3a7d8517 - () https://git.kernel.org/stable/c/e7e943ddd1c6731812357a28e7954ade3a7d8517 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CWE NVD-CWE-noinfo

03 Nov 2025, 18:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfsd: nfsd4_spo_must_allow() debe comprobar que se trata de una solicitud compuesta v4. Si la solicitud que se está procesando no es una solicitud compuesta v4, examinar el estado de ejecución (cstate) puede tener resultados indefinidos. Este parche añade una comprobación de que el procedimiento rpc en ejecución (rq_procinfo) es el procedimiento NFSPROC4_COMPOUND.
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

25 Jul 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-25 15:15

Updated : 2025-12-22 21:54


NVD link : CVE-2025-38430

Mitre link : CVE-2025-38430

CVE.ORG link : CVE-2025-38430


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel