CVE-2025-71090
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | From 6.17.1 (inc) to 6.18.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reference leak in the Linux kernel's NFS server code, specifically in the function nfsd4_add_rdaccess_to_wrdeleg(). The function overwrites a file pointer without releasing the previous reference if the client already has a read access open, causing the previous reference to be orphaned. Additionally, the same file pointer is stored in two places with only a single reference, leading to situations where the reference count does not decrease properly. This causes file references to remain elevated, potentially leading to open conflicts and problems during server shutdown when the system tries to clean up these references but cannot, resulting in a kernel bug.
How can this vulnerability impact me? :
This vulnerability can cause resource leaks in the NFS server, leading to open file conflicts and instability. During server shutdown, the elevated reference counts can prevent proper cleanup of file objects, triggering kernel bugs that may cause crashes or other unexpected behavior, potentially affecting system reliability and availability.