Description
In the Linux kernel, the following vulnerability has been resolved:

nfsd: Fix cred ref leak in nfsd_nl_listener_set_doit().

nfsd_nl_listener_set_doit() uses get_current_cred() without
put_cred().

As we can see from other callers, svc_xprt_create_from_sa()
does not require the extra refcount.

nfsd_nl_listener_set_doit() is always in the process context,
sendmsg(), and current->cred does not go away.

Let's use current_cred() in nfsd_nl_listener_set_doit().
Published: 2026-05-08
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A refcount leak was discovered in the Linux NFS daemon, where the function nfsd_nl_listener_set_doit() obtained a credential reference using get_current_cred() but failed to release it with put_cred(). This oversight causes the kernel to retain unnecessary credential objects, which can grow unbounded in long‑running or high‑traffic NFS operations. While the leak alone does not directly grant elevated privileges, an attacker could potentially amplify the dysfunction by repeatedly invoking the vulnerable path, leading to kernel memory exhaustion and a denial of service.

Affected Systems

All Linux kernel implementations prior to the inclusion of the fix (commit 019debe5851d7355bea9ff0248cc317878924d8f) are affected. The vulnerability is present across all architectures that compile the NFS server module and is not limited to a particular distribution.

Risk and Exploitability

The exploit requires access to the kernel’s NFS subsystem, implying local or privileged execution capability. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, so the current likelihood of exploitation is uncertain. Nonetheless, the CVSS score is 5.5, indicating a moderate impact. From the description, the likely attack vector is local exploitation calling the NFS or sendmsg path. An attacker with local privileges could repeatedly trigger the leak, increasing the risk of resource exhaustion or stability degradation.

Generated by OpenCVE AI on May 9, 2026 at 03:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the kernel to a version that incorporates the commit that fixes the credential refcount leak (019debe5851d7355bea9ff0248cc317878924d8f).
  • Restart the NFS service or reboot the system to ensure the patched kernel is active.
  • If an immediate kernel upgrade is not possible, consider disabling or throttling NFS-related traffic to reduce the opportunity for the leak to accumulate.

Generated by OpenCVE AI on May 9, 2026 at 03:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 02:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-775

Sat, 09 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 08 May 2026 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-775

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: nfsd: Fix cred ref leak in nfsd_nl_listener_set_doit(). nfsd_nl_listener_set_doit() uses get_current_cred() without put_cred(). As we can see from other callers, svc_xprt_create_from_sa() does not require the extra refcount. nfsd_nl_listener_set_doit() is always in the process context, sendmsg(), and current->cred does not go away. Let's use current_cred() in nfsd_nl_listener_set_doit().
Title nfsd: Fix cred ref leak in nfsd_nl_listener_set_doit().
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:38.127Z

Reserved: 2026-05-01T14:12:56.007Z

Link: CVE-2026-43394

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:50.800

Modified: 2026-05-08T15:16:50.800

Link: CVE-2026-43394

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43394 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T04:00:14Z

Weaknesses