In the Linux kernel, the following vulnerability has been resolved:
nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request
If the request being processed is not a v4 compound request, then
examining the cstate can have undefined results.
This patch adds a check that the rpc procedure being executed
(rq_procinfo) is the NFSPROC4_COMPOUND procedure.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2025-07-25 15:15
Updated : 2025-12-22 21:54
NVD link : CVE-2025-38430
Mitre link : CVE-2025-38430
CVE.ORG link : CVE-2025-38430
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
