Impact
The vulnerability occurs in the Linux kernel's NFS server implementation, where the function nfsd_nl_threads_set_doit() incorrectly passes a credential reference obtained via get_current_cred() to other internal functions without releasing it. This leakage of the struct cred reference leads to a memory leak that gradually consumes kernel memory over time. The leak does not directly grant an attacker elevated privileges or code execution, but it can cause resource exhaustion if exploited repeatedly or leveraged against a system that keeps the NFS service active for prolonged periods.
Affected Systems
All Linux kernel versions that include the NFS server code are potentially affected, as the issue is tied to the generic nfsd implementation rather than a specific kernel release. Systems running older kernels that have not yet incorporated the upstream fix are at risk.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not tracked in CISA's KEV catalog, reflecting its limited exploitation potential. Inferred attack vectors involve any entity that can access the NFS service—remote or local clients—using standard write or sendmsg operations to repeatedly trigger the memory leak. While no direct privilege escalation is possible, the cumulative effect can lead to denial‑of‑service conditions by exhausting kernel memory.
OpenCVE Enrichment
Debian DSA