{"id":"CVE-2025-22026","summary":"nfsd: don't ignore the return code of svc_proc_register()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: don't ignore the return code of svc_proc_register()\n\nCurrently, nfsd_proc_stat_init() ignores the return value of\nsvc_proc_register(). If the procfile creation fails, then the kernel\nwill WARN when it tries to remove the entry later.\n\nFix nfsd_proc_stat_init() to return the same type of pointer as\nsvc_proc_register(), and fix up nfsd_net_init() to check that and fail\nthe nfsd_net construction if it occurs.\n\nsvc_proc_register() can fail if the dentry can't be allocated, or if an\nidentical dentry already exists. The second case is pretty unlikely in\nthe nfsd_net construction codepath, so if this happens, return -ENOMEM.","modified":"2026-04-02T12:45:19.691742Z","published":"2025-04-16T14:11:47.243Z","related":["ALSA-2025:16919","ALSA-2025:16920","ALSA-2025:17396","ALSA-2025:18281"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22026.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/30405b23b4d5e2a596fb756d48119d7293194e75"},{"type":"WEB","url":"https://git.kernel.org/stable/c/51da899c209a9624e48be416bd30e7ed5cd6c3d8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6a59b70fe71ec66c0dd19e2c279c71846a3fb2f0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/930b64ca0c511521f0abdd1d57ce52b2a6e3476b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9d9456185fd5f1891c74354ee297f19538141ead"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e31957a819e60cf0bc9a49408765e6095fd3d046"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22026.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22026"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"10ece754df9a799131a1cf3197e9d26c04ddec22"},{"fixed":"51da899c209a9624e48be416bd30e7ed5cd6c3d8"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6f8d6ed3426a17f77628cebfb6a6e2c6f2b2496c"},{"fixed":"30405b23b4d5e2a596fb756d48119d7293194e75"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"93483ac5fec62cc1de166051b219d953bb5e4ef4"},{"fixed":"6a59b70fe71ec66c0dd19e2c279c71846a3fb2f0"},{"fixed":"e31957a819e60cf0bc9a49408765e6095fd3d046"},{"fixed":"9d9456185fd5f1891c74354ee297f19538141ead"},{"fixed":"930b64ca0c511521f0abdd1d57ce52b2a6e3476b"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"5545496966631cd40ad3aa6450be56d0e5773d10"},{"last_affected":"73c43bccf25cec9cdec62fc22a513c28a4b28390"},{"last_affected":"b7b05f98f3f06fea3986b46e5c7fe2928676b02d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-22026.json"}}],"schema_version":"1.7.5"}