CVE-2025-38430
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's NFS server (nfsd) involves the function nfsd4_spo_must_allow() not properly verifying that the request being processed is a version 4 compound request. If the request is not a v4 compound request, examining the cstate can lead to undefined behavior. The patch fixes this by adding a check to ensure the RPC procedure executed is the NFSPROC4_COMPOUND procedure.
How can this vulnerability impact me? :
If exploited, this vulnerability could cause undefined behavior in the NFS server when processing certain requests, potentially leading to instability or unexpected behavior in the Linux kernel's NFS service. However, specific impacts such as data loss, privilege escalation, or denial of service are not detailed in the provided information.