CVE-2025-38724 Affecting python3-perf6.12-debuginfo package, versions <1:6.12.46-66.121.amzn2023


Severity

Recommended
0.0
high
0
10

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.08% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN2023-PYTHON3PERF612DEBUGINFO-13169660
  • published1 Oct 2025
  • disclosed4 Sept 2025

Introduced: 4 Sep 2025

CVE-2025-38724  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2023 python3-perf6.12-debuginfo to version 1:6.12.46-66.121.amzn2023 or higher.
This issue was patched in ALAS2023-2025-1208.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python3-perf6.12-debuginfo package and not the python3-perf6.12-debuginfo package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2023 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()

Lei Lu recently reported that nfsd4_setclientid_confirm() did not check the return value from get_client_locked(). a SETCLIENTID_CONFIRM could race with a confirmed client expiring and fail to get a reference. That could later lead to a UAF.

Fix this by getting a reference early in the case where there is an extant confirmed client. If that fails then treat it as if there were no confirmed client found at all.

In the case where the unconfirmed client is expiring, just fail and return the result from get_client_locked().

CVSS Base Scores

version 3.1