CVE-2026-23297
Memory Leak in Linux Kernel nfsd Component Due to Cred Mismanagement
Publication date: 2026-03-25
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's NFS daemon (nfsd). Specifically, the function nfsd_nl_threads_set_doit() calls get_current_cred() to obtain a credential reference but fails to properly release it with put_cred(), causing the credential reference count to leak.
The leaked credential reference is passed down through various functions without transferring ownership, resulting in unreleased memory. This issue was reported by syzbot and fixed by ensuring the correct use of current_cred() in nfsd_nl_threads_set_doit().
How can this vulnerability impact me? :
The impact of this vulnerability is a memory leak in the Linux kernel's NFS daemon. Over time, this leak can cause increased memory usage, potentially leading to resource exhaustion on the affected system.
Resource exhaustion may degrade system performance or cause instability, especially on systems with heavy NFS usage or limited memory resources.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves a memory leak of struct cred in the Linux kernel's nfsd component. Detection would typically require monitoring for memory leaks related to credential references in the kernel.
One approach is to use kernel memory leak detection tools such as kmemleak to identify unreferenced objects related to credentials.
A command to enable and check kmemleak could be:
- echo scan > /sys/kernel/debug/kmemleak
- cat /sys/kernel/debug/kmemleak
These commands trigger a scan for memory leaks and then display any detected leaks, which may include the leaked cred structures described in this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by correcting the reference counting of credentials in the nfsd_nl_threads_set_doit() function in the Linux kernel.
Immediate mitigation steps include:
- Update your Linux kernel to a version that includes the fix for this vulnerability.
- If updating immediately is not possible, consider limiting or disabling NFS server functionality temporarily to reduce exposure.
- Monitor system logs and memory usage for unusual behavior that might indicate exploitation or resource exhaustion.