Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-22025
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-16 Apr, 2025 | 14:11
Updated At-02 Jan, 2026 | 15:28
Rejected At-
▼CVE Numbering Authority (CNA)
nfsd: put dl_stid if fail to queue dl_recall

In the Linux kernel, the following vulnerability has been resolved: nfsd: put dl_stid if fail to queue dl_recall Before calling nfsd4_run_cb to queue dl_recall to the callback_wq, we increment the reference count of dl_stid. We expect that after the corresponding work_struct is processed, the reference count of dl_stid will be decremented through the callback function nfsd4_cb_recall_release. However, if the call to nfsd4_run_cb fails, the incremented reference count of dl_stid will not be decremented correspondingly, leading to the following nfs4_stid leak: unreferenced object 0xffff88812067b578 (size 344): comm "nfsd", pid 2761, jiffies 4295044002 (age 5541.241s) hex dump (first 32 bytes): 01 00 00 00 6b 6b 6b 6b b8 02 c0 e2 81 88 ff ff ....kkkk........ 00 6b 6b 6b 6b 6b 6b 6b 00 00 00 00 ad 4e ad de .kkkkkkk.....N.. backtrace: kmem_cache_alloc+0x4b9/0x700 nfsd4_process_open1+0x34/0x300 nfsd4_open+0x2d1/0x9d0 nfsd4_proc_compound+0x7a2/0xe30 nfsd_dispatch+0x241/0x3e0 svc_process_common+0x5d3/0xcc0 svc_process+0x2a3/0x320 nfsd+0x180/0x2e0 kthread+0x199/0x1d0 ret_from_fork+0x30/0x50 ret_from_fork_asm+0x1b/0x30 unreferenced object 0xffff8881499f4d28 (size 368): comm "nfsd", pid 2761, jiffies 4295044005 (age 5541.239s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 30 4d 9f 49 81 88 ff ff ........0M.I.... 30 4d 9f 49 81 88 ff ff 20 00 00 00 01 00 00 00 0M.I.... ....... backtrace: kmem_cache_alloc+0x4b9/0x700 nfs4_alloc_stid+0x29/0x210 alloc_init_deleg+0x92/0x2e0 nfs4_set_delegation+0x284/0xc00 nfs4_open_delegation+0x216/0x3f0 nfsd4_process_open2+0x2b3/0xee0 nfsd4_open+0x770/0x9d0 nfsd4_proc_compound+0x7a2/0xe30 nfsd_dispatch+0x241/0x3e0 svc_process_common+0x5d3/0xcc0 svc_process+0x2a3/0x320 nfsd+0x180/0x2e0 kthread+0x199/0x1d0 ret_from_fork+0x30/0x50 ret_from_fork_asm+0x1b/0x30 Fix it by checking the result of nfsd4_run_cb and call nfs4_put_stid if fail to queue dl_recall.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/nfsd/nfs4state.c
Default Status
unaffected
Versions
Affected
  • From b5a1a81e5c25fb6bb3fdc1812ba69ff6ab638fcf before b874cdef4e67e5150e07eff0eae1cbb21fb92da1 (git)
  • From b5a1a81e5c25fb6bb3fdc1812ba69ff6ab638fcf before cdb796137c57e68ca34518d53be53b679351eb86 (git)
  • From b5a1a81e5c25fb6bb3fdc1812ba69ff6ab638fcf before d96587cc93ec369031bcd7658c6adc719873c9fd (git)
  • From b5a1a81e5c25fb6bb3fdc1812ba69ff6ab638fcf before 9a81cde8c7ce65dd90fb47ceea93a45fc1a2fbd1 (git)
  • From b5a1a81e5c25fb6bb3fdc1812ba69ff6ab638fcf before cad3479b63661a399c9df1d0b759e1806e2df3c8 (git)
  • From b5a1a81e5c25fb6bb3fdc1812ba69ff6ab638fcf before 63b91c8ff4589f5263873b24c052447a28e10ef7 (git)
  • From b5a1a81e5c25fb6bb3fdc1812ba69ff6ab638fcf before 133f5e2a37ce08c82d24e8fba65e0a81deae4609 (git)
  • From b5a1a81e5c25fb6bb3fdc1812ba69ff6ab638fcf before 230ca758453c63bd38e4d9f4a21db698f7abada8 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/nfsd/nfs4state.c
Default Status
affected
Versions
Affected
  • 2.6.35
Unaffected
  • From 0 before 2.6.35 (semver)
  • From 5.10.236 through 5.10.* (semver)
  • From 5.15.180 through 5.15.* (semver)
  • From 6.1.134 through 6.1.* (semver)
  • From 6.6.87 through 6.6.* (semver)
  • From 6.12.23 through 6.12.* (semver)
  • From 6.13.11 through 6.13.* (semver)
  • From 6.14.2 through 6.14.* (semver)
  • From 6.15 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/b874cdef4e67e5150e07eff0eae1cbb21fb92da1
N/A
https://git.kernel.org/stable/c/cdb796137c57e68ca34518d53be53b679351eb86
N/A
https://git.kernel.org/stable/c/d96587cc93ec369031bcd7658c6adc719873c9fd
N/A
https://git.kernel.org/stable/c/9a81cde8c7ce65dd90fb47ceea93a45fc1a2fbd1
N/A
https://git.kernel.org/stable/c/cad3479b63661a399c9df1d0b759e1806e2df3c8
N/A
https://git.kernel.org/stable/c/63b91c8ff4589f5263873b24c052447a28e10ef7
N/A
https://git.kernel.org/stable/c/133f5e2a37ce08c82d24e8fba65e0a81deae4609
N/A
https://git.kernel.org/stable/c/230ca758453c63bd38e4d9f4a21db698f7abada8
N/A
Hyperlink: https://git.kernel.org/stable/c/b874cdef4e67e5150e07eff0eae1cbb21fb92da1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cdb796137c57e68ca34518d53be53b679351eb86
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d96587cc93ec369031bcd7658c6adc719873c9fd
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9a81cde8c7ce65dd90fb47ceea93a45fc1a2fbd1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cad3479b63661a399c9df1d0b759e1806e2df3c8
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/63b91c8ff4589f5263873b24c052447a28e10ef7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/133f5e2a37ce08c82d24e8fba65e0a81deae4609
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/230ca758453c63bd38e4d9f4a21db698f7abada8
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
N/A
https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
Resource: N/A
Details not found