Impact
The Linux kernel includes a use‑after‑free bug in the NFSD export put callbacks. If an NFS client is dropped while its export cache entry is still being accessed, the kernel may free the underlying path and client objects before the RCU grace period ends. This can lead to a NULL pointer dereference in d_path, causing a kernel panic. The flaw is a classic use‑after‑free error that can allow an attacker to crash the system or potentially execute code with kernel privileges.
Affected Systems
This flaw affects all deployments of the Linux kernel running the Network File System (NFS) server (nfsv4). No specific vendor or product version is listed, so any kernel built from upstream sources in which the commit is present is potentially impacted.
Risk and Exploitability
The severity cannot be quantified in CVSS terms in the supplied data, but the vulnerability is exploitable remotely over the network via the NFS protocol. The EPSS score is not available, and the issue is not listed in the CISA KEV catalog. Attackers would need to interact with a vulnerable NFS server, and the bug is triggered during the cache invalidate path, so it requires a specially crafted request or concurrent client disconnect. Nonetheless, the bug grants a clear denial‑of‑service vector that can be used as part of a larger compromise.
OpenCVE Enrichment