In the Linux kernel, the following vulnerability has been resolved:
nfsd: don't ignore the return code of svc_proc_register()
Currently, nfsd_proc_stat_init() ignores the return value of
svc_proc_register(). If the procfile creation fails, then the kernel
will WARN when it tries to remove the entry later.
Fix nfsd_proc_stat_init() to return the same type of pointer as
svc_proc_register(), and fix up nfsd_net_init() to check that and fail
the nfsd_net construction if it occurs.
svc_proc_register() can fail if the dentry can't be allocated, or if an
identical dentry already exists. The second case is pretty unlikely in
the nfsd_net construction codepath, so if this happens, return -ENOMEM.
Metrics
Affected Vendors & Products
References
History
Tue, 27 May 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-252 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Sun, 20 Apr 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sat, 19 Apr 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 16 Apr 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: nfsd: don't ignore the return code of svc_proc_register() Currently, nfsd_proc_stat_init() ignores the return value of svc_proc_register(). If the procfile creation fails, then the kernel will WARN when it tries to remove the entry later. Fix nfsd_proc_stat_init() to return the same type of pointer as svc_proc_register(), and fix up nfsd_net_init() to check that and fail the nfsd_net construction if it occurs. svc_proc_register() can fail if the dentry can't be allocated, or if an identical dentry already exists. The second case is pretty unlikely in the nfsd_net construction codepath, so if this happens, return -ENOMEM. | |
Title | nfsd: don't ignore the return code of svc_proc_register() | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-04-16T14:11:47.243Z
Updated: 2025-05-26T05:16:53.347Z
Reserved: 2024-12-29T08:45:45.807Z
Link: CVE-2025-22026

No data.

Status : Awaiting Analysis
Published: 2025-04-16T15:15:55.237
Modified: 2025-04-20T09:15:13.753
Link: CVE-2025-22026
