CVE-2025-22026

MEDIUM

Linux kernel - Info Disclosure

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: nfsd: don't ignore the return code of svc_proc_register() Currently, nfsd_proc_stat_init() ignores the return value of svc_proc_register(). If the procfile creation fails, then the kernel will WARN when it tries to remove the entry later. Fix nfsd_proc_stat_init() to return the same type of pointer as svc_proc_register(), and fix up nfsd_net_init() to check that and fail the nfsd_net construction if it occurs. svc_proc_register() can fail if the dentry can't be allocated, or if an identical dentry already exists. The second case is pretty unlikely in the nfsd_net construction codepath, so if this happens, return -ENOMEM.

Scores

CVSS v3 5.5
EPSS 0.0008
EPSS Percentile 23.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-252
Status published
Products (23)
linux/Kernel < 6.1.164linux
linux/Kernel 6.13.0 - 6.14.2linux
linux/Kernel 6.2.0 - 6.6.125linux
linux/Kernel 6.7.0 - 6.12.24linux
linux/Kernel 6.9.0 - 6.13.12linux
Linux/Linux < 6.9
Linux/Linux 10ece754df9a799131a1cf3197e9d26c04ddec22 - 51da899c209a9624e48be416bd30e7ed5cd6c3d8
Linux/Linux 5545496966631cd40ad3aa6450be56d0e5773d10
Linux/Linux 6.1.164 - 6.1.*
Linux/Linux 6.12.24 - 6.12.*
... and 13 more
Published Apr 16, 2025
Tracked Since Feb 18, 2026