CVE-2025-38724

Updated: 2026-02-27 00:52:29.088474

Description:

In the Linux kernel, the following vulnerability has been resolved: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() Lei Lu recently reported that nfsd4_setclientid_confirm() did not check the return value from get_client_locked(). a SETCLIENTID_CONFIRM could race with a confirmed client expiring and fail to get a reference. That could later lead to a UAF. Fix this by getting a reference early in the case where there is an extant confirmed client. If that fails then treat it as if there were no confirmed client found at all. In the case where the unconfirmed client is expiring, just fail and return the result from get_client_locked().


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2026:1767864313 2026-01-08 16:54:41
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2026:1771078945 2026-02-14 21:01:40
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2026:1771077729 2026-02-14 21:01:41
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2026:1770032032 2026-02-02 15:44:22
Oracle Linux 7 ELS kernel 3.10.0 7.8 HIGH In Testing 2026-02-21 13:51:23
Oracle Linux 7 ELS kernel-uek 5.4.17 7.8 HIGH Already Fixed 2026-02-04 01:20:47
TuxCare 9.6 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2025:1766488019 2025-12-23 19:45:22
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Needs Triage 2026-01-10 06:21:48
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Needs Triage 2026-01-10 06:34:21
Ubuntu 18.04 ELS linux 4.15.0 7.8 HIGH Needs Triage 2026-01-10 06:34:19
Total: 11