Bug 2393172 (CVE-2025-38724) - CVE-2025-38724 kernel: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
Summary: CVE-2025-38724 kernel: nfsd: handle get_client_locked() failure in nfsd4_setc...
Keywords:
Status: NEW
Alias: CVE-2025-38724
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-09-04 16:02 UTC by OSIDB Bzimport
Modified: 2025-12-17 15:00 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:22387 0 None None None 2025-12-01 05:25:29 UTC
Red Hat Product Errata RHSA-2025:22388 0 None None None 2025-12-01 05:58:44 UTC
Red Hat Product Errata RHSA-2025:22392 0 None None None 2025-12-01 09:48:52 UTC
Red Hat Product Errata RHSA-2025:22395 0 None None None 2025-12-01 09:21:27 UTC
Red Hat Product Errata RHSA-2025:22405 0 None None None 2025-12-01 10:39:05 UTC
Red Hat Product Errata RHSA-2025:22571 0 None None None 2025-12-02 10:57:16 UTC
Red Hat Product Errata RHSA-2025:23000 0 None None None 2025-12-10 00:49:28 UTC
Red Hat Product Errata RHSA-2025:23445 0 None None None 2025-12-17 07:45:20 UTC
Red Hat Product Errata RHSA-2025:23463 0 None None None 2025-12-17 15:00:13 UTC

Description OSIDB Bzimport 2025-09-04 16:02:39 UTC
In the Linux kernel, the following vulnerability has been resolved:

nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()

Lei Lu recently reported that nfsd4_setclientid_confirm() did not check
the return value from get_client_locked(). a SETCLIENTID_CONFIRM could
race with a confirmed client expiring and fail to get a reference. That
could later lead to a UAF.

Fix this by getting a reference early in the case where there is an
extant confirmed client. If that fails then treat it as if there were no
confirmed client found at all.

In the case where the unconfirmed client is expiring, just fail and
return the result from get_client_locked().

Comment 4 errata-xmlrpc 2025-12-01 05:25:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:22387 https://access.redhat.com/errata/RHSA-2025:22387

Comment 5 errata-xmlrpc 2025-12-01 05:58:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:22388 https://access.redhat.com/errata/RHSA-2025:22388

Comment 6 errata-xmlrpc 2025-12-01 09:21:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:22395 https://access.redhat.com/errata/RHSA-2025:22395

Comment 7 errata-xmlrpc 2025-12-01 09:48:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2025:22392 https://access.redhat.com/errata/RHSA-2025:22392

Comment 8 errata-xmlrpc 2025-12-01 10:39:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:22405 https://access.redhat.com/errata/RHSA-2025:22405

Comment 9 errata-xmlrpc 2025-12-02 10:57:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2025:22571 https://access.redhat.com/errata/RHSA-2025:22571

Comment 10 errata-xmlrpc 2025-12-10 00:49:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:23000 https://access.redhat.com/errata/RHSA-2025:23000

Comment 11 errata-xmlrpc 2025-12-17 07:45:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:23445 https://access.redhat.com/errata/RHSA-2025:23445

Comment 12 errata-xmlrpc 2025-12-17 15:00:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2025:23463 https://access.redhat.com/errata/RHSA-2025:23463


Note You need to log in before you can comment on or make changes to this bug.