Impact
The NFS daemon creates a /proc/fs/nfs/exports entry that stores the current network namespace without taking a reference on it; when the namespace is torn down after the file descriptor is open, the export cache is freed. Subsequent reads on the open descriptor then dereference freed memory, which can crash the kernel or destabilize the system.
Affected Systems
All Linux systems that compile and load the NFSD module are affected. The vulnerability is present in any kernel that keeps the /proc/fs/nfs/exports entry active for the lifetime of the module, irrespective of the kernel release, so users should verify whether their running kernel contains this module and the vulnerable code path.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, but the EPSS score is below 1% and the vulnerability is not in the CISA KEV catalog, which lowers the likelihood of exploitation. If an attacker can open the /proc/fs/nfs/exports file and then alter or destroy the network namespace (a scenario that can occur in container or virtualized environments), the use‑after‑free could be triggered. The impact is primarily a denial of service, although the description does not explicitly state arbitrary code execution. Therefore the risk is moderate, largely dependent on the local access and namespace manipulation capabilities of the threat actor.
OpenCVE Enrichment