CVE-2025-22026
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/04/2025
Last modified:
19/02/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
nfsd: don&#39;t ignore the return code of svc_proc_register()<br />
<br />
Currently, nfsd_proc_stat_init() ignores the return value of<br />
svc_proc_register(). If the procfile creation fails, then the kernel<br />
will WARN when it tries to remove the entry later.<br />
<br />
Fix nfsd_proc_stat_init() to return the same type of pointer as<br />
svc_proc_register(), and fix up nfsd_net_init() to check that and fail<br />
the nfsd_net construction if it occurs.<br />
<br />
svc_proc_register() can fail if the dentry can&#39;t be allocated, or if an<br />
identical dentry already exists. The second case is pretty unlikely in<br />
the nfsd_net construction codepath, so if this happens, return -ENOMEM.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.24 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (including) | 6.14.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/30405b23b4d5e2a596fb756d48119d7293194e75
- https://git.kernel.org/stable/c/51da899c209a9624e48be416bd30e7ed5cd6c3d8
- https://git.kernel.org/stable/c/6a59b70fe71ec66c0dd19e2c279c71846a3fb2f0
- https://git.kernel.org/stable/c/930b64ca0c511521f0abdd1d57ce52b2a6e3476b
- https://git.kernel.org/stable/c/9d9456185fd5f1891c74354ee297f19538141ead
- https://git.kernel.org/stable/c/e31957a819e60cf0bc9a49408765e6095fd3d046



