Impact
In the Linux kernel, the netfs module had an error where read requests could abandon all remaining subrequests during retry. The bug arises due to an uninitialized or dangling subrequest pointer, causing the kernel to trigger an oops and crash when the retry logic attempts to process invalid memory. This results in a denial of service, as the crash can bring the system down or require a reboot.
Affected Systems
All Linux kernel installations that include the netfs subsystem prior to the applied fix are affected, including standard distributions that ship the unpatched kernel. The issue resides in the network file system read handling code, so any system exposed to NFS traffic (clients or servers) is at risk.
Risk and Exploitability
The vulnerability is a critical kernel bug that can lead to a crash, but it lacks a publicly available exploitation reference. EPSS is not available and KEV does not list it, suggesting limited exploitation in the wild. The attack likely requires the ability to trigger a problematic read operation over a network file system, meaning that an attacker with network access to the affected service could potentially force a failure. The risk therefore remains high for exposed systems, and patching should be prioritized.
OpenCVE Enrichment