Impact
In the Linux kernel, a reference count leak in the nfsd_get_dir_deleg function allows memory to be unintentionally retained. This leak can cause kernel memory usage to grow over time, potentially exhausting system resources and leading to a denial‑of‑service condition for users of the NFS service. The vulnerability maps to CWE‑401, Memory Leak.
Affected Systems
The flaw exists in the Linux kernel itself and therefore affects all installations running affected kernel versions. Specific version details are not provided, so any machine using a kernel build that includes the unpatched nfsd code is vulnerable. The only vendor listed is Linux and the product is the Linux kernel.
Risk and Exploitability
No EPSS score is available and the vulnerability is not catalogued in CISA’s KEV. Although a formal CVSS score is missing, the potential for memory exhaustion suggests that the risk is significant, particularly for servers exposed to unauthenticated NFS clients. The likely attack vector would involve an adversary interacting with the NFS daemon, for example by issuing repeated delegation requests, to drive the leak. The lack of exploitation metrics makes the exact probability unclear, but the severity of the impact warrants prompt attention.
OpenCVE Enrichment