Impact
A use‑after‑free flaw in the Linux NFS server causes a NULL pointer dereference when export objects are released before the RCU grace period ends. The bug occurs in svc_export_put() which frees path and client sub-objects immediately, while RCU readers in e_show() and c_show() access these objects without holding a reference. Concurrent removal of the export entry frees the sub-objects while still in use, resulting in a kernel panic that disrupts all kernel operations.
Affected Systems
All Linux kernels that include the NFS daemon and do not contain commit 2530766492ec are affected. The CPE list shows kernels from 7.0 rc1 to rc4 and the generic Linux kernel. In practice this includes mainstream distributions’ kernels built before the fix and any custom kernels that have not been updated.
Risk and Exploitability
The CVSS score of 7.8 reflects high severity, while the EPSS score is below 1%, indicating a low likelihood of exploitation. This vulnerability is not listed in CISA KEV. Based on the description, it is inferred that an attacker would need to trigger the flaw via privileged NFS operations or by manipulating cache cleanup, implying the attack vector is tied to NFS service usage. The impact remains a denial-of-service due to kernel panic, not arbitrary code execution.
OpenCVE Enrichment