In the Linux kernel, the following vulnerability has been resolved:
nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request
If the request being processed is not a v4 compound request, then
examining the cstate can have undefined results.
This patch adds a check that the rpc procedure being executed
(rq_procinfo) is the NFSPROC4_COMPOUND procedure.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
22 Dec 2025, 21:54
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/1244f0b2c3cecd3f349a877006e67c9492b41807 - Patch | |
| References | () https://git.kernel.org/stable/c/2c54bd5a380ebf646fb9efbc4ae782ff3a83a5af - Patch | |
| References | () https://git.kernel.org/stable/c/425efc6b3292a3c79bfee4a1661cf043dcd9cf2f - Patch | |
| References | () https://git.kernel.org/stable/c/64a723b0281ecaa59d31aad73ef8e408a84cb603 - Patch | |
| References | () https://git.kernel.org/stable/c/7a75a956692aa64211a9e95781af1ec461642de4 - Patch | |
| References | () https://git.kernel.org/stable/c/b1d0323a09a29f81572c7391e0d80d78724729c9 - Patch | |
| References | () https://git.kernel.org/stable/c/bf78a2706ce975981eb5167f2d3b609eb5d24c19 - Patch | |
| References | () https://git.kernel.org/stable/c/e7e943ddd1c6731812357a28e7954ade3a7d8517 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| CWE | NVD-CWE-noinfo |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
25 Jul 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-25 15:15
Updated : 2025-12-22 21:54
NVD link : CVE-2025-38430
Mitre link : CVE-2025-38430
CVE.ORG link : CVE-2025-38430
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
