Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-38231
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-04 Jul, 2025 | 13:37
Updated At-03 Nov, 2025 | 17:35
Rejected At-
▼CVE Numbering Authority (CNA)
nfsd: Initialize ssc before laundromat_work to prevent NULL dereference

In the Linux kernel, the following vulnerability has been resolved: nfsd: Initialize ssc before laundromat_work to prevent NULL dereference In nfs4_state_start_net(), laundromat_work may access nfsd_ssc through nfs4_laundromat -> nfsd4_ssc_expire_umount. If nfsd_ssc isn't initialized, this can cause NULL pointer dereference. Normally the delayed start of laundromat_work allows sufficient time for nfsd_ssc initialization to complete. However, when the kernel waits too long for userspace responses (e.g. in nfs4_state_start_net -> nfsd4_end_grace -> nfsd4_record_grace_done -> nfsd4_cld_grace_done -> cld_pipe_upcall -> __cld_pipe_upcall -> wait_for_completion path), the delayed work may start before nfsd_ssc initialization finishes. Fix this by moving nfsd_ssc initialization before starting laundromat_work.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/nfsd/nfssvc.c
Default Status
unaffected
Versions
Affected
  • From a4bc287943f5695209ff36bdc89f17b48d68fae7 before deaeb74ae9318252829c59a84a7d2316fc335660 (git)
  • From f4e44b393389c77958f7c58bf4415032b4cda15b before 0fccf5f01ed28725cc313a66ca1247eef911d55e (git)
  • From f4e44b393389c77958f7c58bf4415032b4cda15b before a97668ec6d73dab237cd1c15efe012a10090a4ed (git)
  • From f4e44b393389c77958f7c58bf4415032b4cda15b before 5060e1a5fef184bd11d298e3f0ee920d96a23236 (git)
  • From f4e44b393389c77958f7c58bf4415032b4cda15b before d622c2ee6c08147ab8c9b9e37d93b6e95d3258e0 (git)
  • From f4e44b393389c77958f7c58bf4415032b4cda15b before 83ac1ba8ca102ab5c0ed4351f8ac6e74ac4d5d64 (git)
  • From f4e44b393389c77958f7c58bf4415032b4cda15b before b31da62889e6d610114d81dc7a6edbcaa503fcf8 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/nfsd/nfssvc.c
Default Status
affected
Versions
Affected
  • 5.14
Unaffected
  • From 0 before 5.14 (semver)
  • From 5.10.239 through 5.10.* (semver)
  • From 5.15.186 through 5.15.* (semver)
  • From 6.1.142 through 6.1.* (semver)
  • From 6.6.95 through 6.6.* (semver)
  • From 6.12.35 through 6.12.* (semver)
  • From 6.15.4 through 6.15.* (semver)
  • From 6.16 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/deaeb74ae9318252829c59a84a7d2316fc335660
N/A
https://git.kernel.org/stable/c/0fccf5f01ed28725cc313a66ca1247eef911d55e
N/A
https://git.kernel.org/stable/c/a97668ec6d73dab237cd1c15efe012a10090a4ed
N/A
https://git.kernel.org/stable/c/5060e1a5fef184bd11d298e3f0ee920d96a23236
N/A
https://git.kernel.org/stable/c/d622c2ee6c08147ab8c9b9e37d93b6e95d3258e0
N/A
https://git.kernel.org/stable/c/83ac1ba8ca102ab5c0ed4351f8ac6e74ac4d5d64
N/A
https://git.kernel.org/stable/c/b31da62889e6d610114d81dc7a6edbcaa503fcf8
N/A
Hyperlink: https://git.kernel.org/stable/c/deaeb74ae9318252829c59a84a7d2316fc335660
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0fccf5f01ed28725cc313a66ca1247eef911d55e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a97668ec6d73dab237cd1c15efe012a10090a4ed
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5060e1a5fef184bd11d298e3f0ee920d96a23236
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d622c2ee6c08147ab8c9b9e37d93b6e95d3258e0
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/83ac1ba8ca102ab5c0ed4351f8ac6e74ac4d5d64
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b31da62889e6d610114d81dc7a6edbcaa503fcf8
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
N/A
https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
Resource: N/A
Details not found