CVE-2025-68185
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-16

Last updated on: 2025-12-18

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode dereferencing Theoretically it's an oopsable race, but I don't believe one can manage to hit it on real hardware; might become doable on a KVM, but it still won't be easy to attack. Anyway, it's easy to deal with - since xdr_encode_hyper() is just a call of put_unaligned_be64(), we can put that under ->d_lock and be done with that.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-16
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel involves insufficient locking when dereferencing the d_parent->d_inode pointer in the nfs4_setup_readdir() function. It is theoretically a race condition that could cause a kernel oops (crash), but it is unlikely to be triggered on real hardware and might only be possible in virtualized environments like KVM. The fix involves adding proper locking around the call to put_unaligned_be64() to prevent this race condition.


How can this vulnerability impact me? :

If exploited, this vulnerability could cause a kernel oops (crash) due to a race condition in the Linux kernel's NFS code. However, it is considered difficult to trigger on real hardware, so the practical impact is low. In virtualized environments such as KVM, it might be more feasible to exploit, potentially leading to system instability or denial of service.


What immediate steps should I take to mitigate this vulnerability?

Apply the patch or update to the fixed Linux kernel version that addresses the insufficient locking in nfs4_setup_readdir(). Since the vulnerability is related to kernel code, updating the kernel is the recommended mitigation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart