Description
In the Linux kernel, the following vulnerability has been resolved: nfsd: don't ignore the return code of svc_proc_register() Currently, nfsd_proc_stat_init() ignores the return value of svc_proc_register(). If the procfile creation fails, then the kernel will WARN when it tries to remove the entry later. Fix nfsd_proc_stat_init() to return the same type of pointer as svc_proc_register(), and fix up nfsd_net_init() to check that and fail the nfsd_net construction if it occurs. svc_proc_register() can fail if the dentry can't be allocated, or if an identical dentry already exists. The second case is pretty unlikely in the nfsd_net construction codepath, so if this happens, return -ENOMEM.
References (6)
Scores
CVSS v3
5.5
EPSS
0.0008
EPSS Percentile
23.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-252
Status
published
Products (23)
linux/Kernel
< 6.1.164linux
linux/Kernel
6.13.0 - 6.14.2linux
linux/Kernel
6.2.0 - 6.6.125linux
linux/Kernel
6.7.0 - 6.12.24linux
linux/Kernel
6.9.0 - 6.13.12linux
Linux/Linux
< 6.9
Linux/Linux
10ece754df9a799131a1cf3197e9d26c04ddec22 - 51da899c209a9624e48be416bd30e7ed5cd6c3d8
Linux/Linux
5545496966631cd40ad3aa6450be56d0e5773d10
Linux/Linux
6.1.164 - 6.1.*
Linux/Linux
6.12.24 - 6.12.*
... and 13 more
Published
Apr 16, 2025
Tracked Since
Feb 18, 2026