Bug 2393172 (CVE-2025-38724)
| Summary: | CVE-2025-38724 kernel: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A vulnerability has been identified in the Linux kernel's Network File System (NFS) daemon that could allow for a Denial of Service and in worst case scenario Arbitrary Code Execution. This Use-After-Free flaw arises from a race condition when the kernel handles the confirmation of an NFS client identifier. If an NFS client is expiring while this confirmation is in progress, the system can attempt to use memory that is no longer allocated.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
OSIDB Bzimport
2025-09-04 16:02:39 UTC
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025090401-CVE-2025-38724-5309@gregkh/T This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:22387 https://access.redhat.com/errata/RHSA-2025:22387 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:22388 https://access.redhat.com/errata/RHSA-2025:22388 This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:22395 https://access.redhat.com/errata/RHSA-2025:22395 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2025:22392 https://access.redhat.com/errata/RHSA-2025:22392 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:22405 https://access.redhat.com/errata/RHSA-2025:22405 This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2025:22571 https://access.redhat.com/errata/RHSA-2025:22571 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2025:23000 https://access.redhat.com/errata/RHSA-2025:23000 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2025:23445 https://access.redhat.com/errata/RHSA-2025:23445 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On Via RHSA-2025:23463 https://access.redhat.com/errata/RHSA-2025:23463 |