A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.
Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25212
Reference (s):
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.3
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b4487b93545214a9db8cbf32e86411677b0cca21
- https://twitter.com/grsecurity/status/1303370421958578179
- MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- URL: https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html

