CVE-2025-38724

Updated: 2026-01-10 01:48:43.474801

Description:

In the Linux kernel, the following vulnerability has been resolved: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() Lei Lu recently reported that nfsd4_setclientid_confirm() did not check the return value from get_client_locked(). a SETCLIENTID_CONFIRM could race with a confirmed client expiring and fail to get a reference. That could later lead to a UAF. Fix this by getting a reference early in the case where there is an extant confirmed client. If that fails then treat it as if there were no confirmed client found at all. In the case where the unconfirmed client is expiring, just fail and return the result from get_client_locked().


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2026:1767864313 2026-01-08 16:54:41
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Needs Triage 2025-12-01 15:31:32
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Needs Triage 2025-12-01 15:31:31
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH In Testing 2025-12-08 17:13:25
Oracle Linux 7 ELS kernel 3.10.0 7.8 HIGH Needs Triage 2025-12-16 17:00:27
Oracle Linux 7 ELS kernel-uek 5.4.17 7.8 HIGH Needs Triage 2025-11-20 09:53:24
TuxCare 9.6 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2025:1766488019 2025-12-23 19:45:22
Ubuntu 20.04 ELS linux 5.4.0 7.8 HIGH Needs Triage 2025-12-09 19:17:03