๐Ÿ” CVE Alert

CVE-2025-38430

UNKNOWN 0.0

nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request If the request being processed is not a v4 compound request, then examining the cstate can have undefined results. This patch adds a check that the rpc procedure being executed (rq_procinfo) is the NFSPROC4_COMPOUND procedure.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 25, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ed94164398c935a42be7b129a478eb19c598b68a < bf78a2706ce975981eb5167f2d3b609eb5d24c19 ed94164398c935a42be7b129a478eb19c598b68a < b1d0323a09a29f81572c7391e0d80d78724729c9 ed94164398c935a42be7b129a478eb19c598b68a < 425efc6b3292a3c79bfee4a1661cf043dcd9cf2f ed94164398c935a42be7b129a478eb19c598b68a < 64a723b0281ecaa59d31aad73ef8e408a84cb603 ed94164398c935a42be7b129a478eb19c598b68a < e7e943ddd1c6731812357a28e7954ade3a7d8517 ed94164398c935a42be7b129a478eb19c598b68a < 7a75a956692aa64211a9e95781af1ec461642de4 ed94164398c935a42be7b129a478eb19c598b68a < 2c54bd5a380ebf646fb9efbc4ae782ff3a83a5af ed94164398c935a42be7b129a478eb19c598b68a < 1244f0b2c3cecd3f349a877006e67c9492b41807
Linux / Linux
4.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/bf78a2706ce975981eb5167f2d3b609eb5d24c19 git.kernel.org: https://git.kernel.org/stable/c/b1d0323a09a29f81572c7391e0d80d78724729c9 git.kernel.org: https://git.kernel.org/stable/c/425efc6b3292a3c79bfee4a1661cf043dcd9cf2f git.kernel.org: https://git.kernel.org/stable/c/64a723b0281ecaa59d31aad73ef8e408a84cb603 git.kernel.org: https://git.kernel.org/stable/c/e7e943ddd1c6731812357a28e7954ade3a7d8517 git.kernel.org: https://git.kernel.org/stable/c/7a75a956692aa64211a9e95781af1ec461642de4 git.kernel.org: https://git.kernel.org/stable/c/2c54bd5a380ebf646fb9efbc4ae782ff3a83a5af git.kernel.org: https://git.kernel.org/stable/c/1244f0b2c3cecd3f349a877006e67c9492b41807 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html