VYPR
High severity7.8NVD Advisory· Published Sep 4, 2025· Updated May 12, 2026

CVE-2025-38724

CVE-2025-38724

Description

In the Linux kernel, the following vulnerability has been resolved:

nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()

Lei Lu recently reported that nfsd4_setclientid_confirm() did not check the return value from get_client_locked(). a SETCLIENTID_CONFIRM could race with a confirmed client expiring and fail to get a reference. That could later lead to a UAF.

Fix this by getting a reference early in the case where there is an extant confirmed client. If that fails then treat it as if there were no confirmed client found at all.

In the case where the unconfirmed client is expiring, just fail and return the result from get_client_locked().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, nfsd4_setclientid_confirm() lacks a check on get_client_locked() return value, leading to a use-after-free from race with client expiration.

Vulnerability

CVE-2025-38724 is a use-after-free vulnerability in the Linux kernel's NFSv4 server (nfsd). The function nfsd4_setclientid_confirm() fails to check the return value of get_client_locked(). If a SETCLIENTID_CONFIRM request races with the expiration of a confirmed client, the function may operate on a freed client structure, leading to a use-after-free condition.

Exploitation

Exploitation requires the ability to send NFSv4 SETCLIENTID_CONFIRM commands to the target system. An attacker must be able to trigger the race condition between the confirmation and client expiration. This can be done locally or remotely if NFSv4 is accessible over the network. No special privileges are needed beyond network access to the NFS server.

Impact

A successful exploit could crash the system or potentially allow an attacker to escalate privileges, as the use-after-free may be leveraged for arbitrary code execution within the kernel.

Mitigation

The vulnerability is fixed in Linux kernel commits [3] and [4]. Users should apply the latest kernel updates from their distribution or compile a patched kernel. Siemens also lists affected products in advisories [1] and [2] that require firmware updates.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

13

News mentions

1