๐Ÿ” CVE Alert

CVE-2025-38231

UNKNOWN 0.0

nfsd: Initialize ssc before laundromat_work to prevent NULL dereference

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: nfsd: Initialize ssc before laundromat_work to prevent NULL dereference In nfs4_state_start_net(), laundromat_work may access nfsd_ssc through nfs4_laundromat -> nfsd4_ssc_expire_umount. If nfsd_ssc isn't initialized, this can cause NULL pointer dereference. Normally the delayed start of laundromat_work allows sufficient time for nfsd_ssc initialization to complete. However, when the kernel waits too long for userspace responses (e.g. in nfs4_state_start_net -> nfsd4_end_grace -> nfsd4_record_grace_done -> nfsd4_cld_grace_done -> cld_pipe_upcall -> __cld_pipe_upcall -> wait_for_completion path), the delayed work may start before nfsd_ssc initialization finishes. Fix this by moving nfsd_ssc initialization before starting laundromat_work.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 4, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
a4bc287943f5695209ff36bdc89f17b48d68fae7 < deaeb74ae9318252829c59a84a7d2316fc335660 f4e44b393389c77958f7c58bf4415032b4cda15b < 0fccf5f01ed28725cc313a66ca1247eef911d55e f4e44b393389c77958f7c58bf4415032b4cda15b < a97668ec6d73dab237cd1c15efe012a10090a4ed f4e44b393389c77958f7c58bf4415032b4cda15b < 5060e1a5fef184bd11d298e3f0ee920d96a23236 f4e44b393389c77958f7c58bf4415032b4cda15b < d622c2ee6c08147ab8c9b9e37d93b6e95d3258e0 f4e44b393389c77958f7c58bf4415032b4cda15b < 83ac1ba8ca102ab5c0ed4351f8ac6e74ac4d5d64 f4e44b393389c77958f7c58bf4415032b4cda15b < b31da62889e6d610114d81dc7a6edbcaa503fcf8
Linux / Linux
5.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/deaeb74ae9318252829c59a84a7d2316fc335660 git.kernel.org: https://git.kernel.org/stable/c/0fccf5f01ed28725cc313a66ca1247eef911d55e git.kernel.org: https://git.kernel.org/stable/c/a97668ec6d73dab237cd1c15efe012a10090a4ed git.kernel.org: https://git.kernel.org/stable/c/5060e1a5fef184bd11d298e3f0ee920d96a23236 git.kernel.org: https://git.kernel.org/stable/c/d622c2ee6c08147ab8c9b9e37d93b6e95d3258e0 git.kernel.org: https://git.kernel.org/stable/c/83ac1ba8ca102ab5c0ed4351f8ac6e74ac4d5d64 git.kernel.org: https://git.kernel.org/stable/c/b31da62889e6d610114d81dc7a6edbcaa503fcf8 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html