Impact
A flaw in the Linux NFS server causes a use‑after‑free when export objects are released prematurely. Clean‑up functions free the path and client name before the RCU grace period ends, so an RCU reader that accesses these objects can dereference a NULL pointer and trigger a kernel panic. The crash disrupts all kernel operations, effectively denying service to the host.
Affected Systems
All Linux kernels that include the NFS daemon but have not incorporated commit 2530766492ec are vulnerable. Exact version boundaries are not listed, so any kernel built before this commit—across mainstream distributions and custom builds—may be affected. Systems that never run the nfsd service are not susceptible.
Risk and Exploitability
The CVSS score of 7.8 reflects high severity, while the EPSS score is below 1 %, indicating a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. An attacker must first obtain code execution at kernel level or leverage a privileged NFS operation to trigger the affected code path; the result is a denial‑of‑service rather than arbitrary code execution.
OpenCVE Enrichment