Impact
The Linux kernel contains a race condition in the NFS server shutdown routine. During shutdown, the v4_end_grace flag can be written while the server is terminating, causing code to access memory that has already been freed. This results in a use‑after‑free flaw that can produce a crash or other memory‑corruption symptoms. The vulnerability is identified as CWE‑416.
Affected Systems
The flaw affects the Linux operating system kernel, particularly the 6.19 release candidate series (rc1 through rc4) and all other kernel versions that include the NFS server component. Any system running an unpatched kernel and exposing an NFSv4 server is potentially exposed.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity. The EPSS score of less than 1% suggests a very low probability of exploitation at the time of analysis. The vulnerability is not listed in CISA’s KEV catalog. Exploitation would require a way to trigger the NFS server shutdown while the race condition can occur, implying that a privileged or local attacker might be able to exercise the flaw.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN