Impact
An administrative NFS filesystem unlock operation can crash the NFS daemon when the server is not running. The crash is caused by a use‑after‑free bug in the nfsd4_revoke_states() function, which accesses a state structure that has already been freed during server shutdown. The resulting kernel panic terminates the NFS service and disrupts all clients that rely on that share.
Affected Systems
The vulnerability is present in Linux kernel releases that include the nfsd code path, specifically the 6.19‑rc1 through 6.19‑rc4 releases and any later kernel builds that did not apply the patch. All Linux distributions running these kernels are potentially affected.
Risk and Exploitability
The problem carries a CVSS score of 5.5, indicating a moderate severity. The EPSS score is less than 1%, meaning exploitability is judged to be low in the broader ecosystem. The issue has not been listed in the CISA KEV catalog. Because the bug is triggered by an administrative unlock command executed while nfsd is not running, it likely requires local privileged access, limiting the attack surface. Nevertheless, a privileged attacker can induce a denial‑of‑service by repeatedly triggering the crash, potentially causing availability issues for the affected system.
OpenCVE Enrichment
Debian DSA