-

CVE-2025-38231

In the Linux kernel, the following vulnerability has been resolved:

nfsd: Initialize ssc before laundromat_work to prevent NULL dereference

In nfs4_state_start_net(), laundromat_work may access nfsd_ssc through
nfs4_laundromat -> nfsd4_ssc_expire_umount. If nfsd_ssc isn't initialized,
this can cause NULL pointer dereference.

Normally the delayed start of laundromat_work allows sufficient time for
nfsd_ssc initialization to complete. However, when the kernel waits too
long for userspace responses (e.g. in nfs4_state_start_net ->
nfsd4_end_grace -> nfsd4_record_grace_done -> nfsd4_cld_grace_done ->
cld_pipe_upcall -> __cld_pipe_upcall -> wait_for_completion path), the
delayed work may start before nfsd_ssc initialization finishes.

Fix this by moving nfsd_ssc initialization before starting laundromat_work.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < deaeb74ae9318252829c59a84a7d2316fc335660
Version a4bc287943f5695209ff36bdc89f17b48d68fae7
Status affected
Version < 0fccf5f01ed28725cc313a66ca1247eef911d55e
Version f4e44b393389c77958f7c58bf4415032b4cda15b
Status affected
Version < a97668ec6d73dab237cd1c15efe012a10090a4ed
Version f4e44b393389c77958f7c58bf4415032b4cda15b
Status affected
Version < 5060e1a5fef184bd11d298e3f0ee920d96a23236
Version f4e44b393389c77958f7c58bf4415032b4cda15b
Status affected
Version < d622c2ee6c08147ab8c9b9e37d93b6e95d3258e0
Version f4e44b393389c77958f7c58bf4415032b4cda15b
Status affected
Version < 83ac1ba8ca102ab5c0ed4351f8ac6e74ac4d5d64
Version f4e44b393389c77958f7c58bf4415032b4cda15b
Status affected
Version < b31da62889e6d610114d81dc7a6edbcaa503fcf8
Version f4e44b393389c77958f7c58bf4415032b4cda15b
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.14
Status affected
Version < 5.14
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.239
Status unaffected
Version <= 5.15.*
Version 5.15.186
Status unaffected
Version <= 6.1.*
Version 6.1.142
Status unaffected
Version <= 6.6.*
Version 6.6.95
Status unaffected
Version <= 6.12.*
Version 6.12.35
Status unaffected
Version <= 6.15.*
Version 6.15.4
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.097
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string