-

CVE-2025-68803

In the Linux kernel, the following vulnerability has been resolved:

NFSD: NFSv4 file creation neglects setting ACL

An NFSv4 client that sets an ACL with a named principal during file
creation retrieves the ACL afterwards, and finds that it is only a
default ACL (based on the mode bits) and not the ACL that was
requested during file creation. This violates RFC 8881 section
6.4.1.3: "the ACL attribute is set as given".

The issue occurs in nfsd_create_setattr(), which calls
nfsd_attrs_valid() to determine whether to call nfsd_setattr().
However, nfsd_attrs_valid() checks only for iattr changes and
security labels, but not POSIX ACLs. When only an ACL is present,
the function returns false, nfsd_setattr() is skipped, and the
POSIX ACL is never applied to the inode.

Subsequently, when the client retrieves the ACL, the server finds
no POSIX ACL on the inode and returns one generated from the file's
mode bits rather than returning the originally-specified ACL.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < c182e1e0b7640f6bcc0c5ca8d473f7c57199ea3d
Version c5409ce523af40d5c3019717bc5b4f72038d48be
Status affected
Version < 75f91534f9acdfef77f8fa094313b7806f801725
Version d52acd23a327cada5fb597591267cfc09f08bb1d
Status affected
Version < 60dbdef2ebc2317266a385e4debdb1bb0e57afe1
Version c0cbe70742f4a70893cd6e5f6b10b6e89b6db95b
Status affected
Version < 381261f24f4e4b41521c0e5ef5cc0b9a786a9862
Version c0cbe70742f4a70893cd6e5f6b10b6e89b6db95b
Status affected
Version < bf4e671c651534a307ab2fabba4926116beef8c3
Version c0cbe70742f4a70893cd6e5f6b10b6e89b6db95b
Status affected
Version < 214b396480061cbc8b16f2c518b2add7fbfa5192
Version c0cbe70742f4a70893cd6e5f6b10b6e89b6db95b
Status affected
Version < 913f7cf77bf14c13cfea70e89bcb6d0b22239562
Version c0cbe70742f4a70893cd6e5f6b10b6e89b6db95b
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 6.0
Status affected
Version < 6.0
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.248
Status unaffected
Version <= 5.15.*
Version 5.15.198
Status unaffected
Version <= 6.1.*
Version 6.1.160
Status unaffected
Version <= 6.6.*
Version 6.6.121
Status unaffected
Version <= 6.12.*
Version 6.12.64
Status unaffected
Version <= 6.18.*
Version 6.18.3
Status unaffected
Version <= *
Version 6.19-rc3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.088
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.