CVE-2026-22989
BaseFortify
Publication date: 2026-01-23
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.6 (exc) |
| linux | linux_kernel | From 6.9 (inc) to 6.12.66 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's NFS daemon (nfsd) when attempting to unlock the filesystem via an administrative interface while the nfsd server is not running. Specifically, the function nfsd4_revoke_states() accesses state structures that have already been freed during server shutdown, causing the server to crash. The fix involves taking a mutex (nfsd_mutex) and verifying that the server is still running before proceeding, preventing the crash.
How can this vulnerability impact me? :
If exploited, this vulnerability can cause the Linux server running the NFS daemon to crash when an administrative unlock operation is attempted while the nfsd server is not running. This can lead to denial of service, disrupting access to network file systems and potentially impacting system availability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the nfsd server is running before attempting to unlock the filesystem via the administrative interface. This prevents the server crash caused by accessing freed state structures. Specifically, the fix involves taking the nfsd_mutex and checking that the server is still up, then holding the mutex across the call to nfsd4_revoke_states(). Applying the relevant kernel patch or updating to a fixed kernel version that includes this check is recommended.