PT-2026-30187 · Linux · Linux Kernel
Published
2026-02-19
·
Updated
2026-04-03
·
CVE-2026-31404
CVSS v3.1
7.8
High
| Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Linux kernel (affected versions not specified)
Description
The Linux kernel contains a flaw within the NFS daemon (NFSD) related to the handling of sub-object cleanup during export release. Specifically, the
svc export put() function calls path put() and auth domain put() immediately, potentially before the RCU grace period completes. This can lead to a NULL pointer dereference in d path if the cache is cleaned and the last reference is dropped concurrently while RCU readers are still accessing the sub-objects. The issue stems from the immediate freeing of resources before ensuring all RCU readers have finished accessing them. The fix involves deferring the cleanup using queue rcu work() to ensure the callback executes in process context after the RCU grace period, preventing the use of freed memory. The fix also applies to expkey put() with similar patterns.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
NULL Pointer Dereference
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Linux Kernel