CVE-2026-31404
Use-After-Free Vulnerability in Linux Kernel NFSD Export Cleanup
Publication date: 2026-04-03
Last updated on: 2026-04-27
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | nfsd | * |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by deferring the cleanup of sub-objects in export put callbacks to after the RCU grace period, preventing use-after-free conditions.
To mitigate this vulnerability immediately, you should update your Linux kernel to a version that includes the fix described, which replaces call_rcu/kfree_rcu with queue_rcu_work() to defer callbacks safely.
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's NFS daemon (NFSD) related to how sub-objects are cleaned up during export put callbacks. Specifically, functions like svc_export_put() prematurely call path_put() and auth_domain_put() to release resources before the Read-Copy-Update (RCU) grace period ends. Meanwhile, RCU readers access these resources without holding proper references, which can lead to the sub-objects being freed while still in use. This causes a NULL pointer dereference in the d_path function.
The fix involves deferring the cleanup of these sub-objects until after the RCU grace period by replacing call_rcu/kfree_rcu with queue_rcu_work(), which executes the cleanup in process context where sleeping is allowed. This ensures that path_put() and auth_domain_put() are called safely after the grace period, preventing use-after-free errors.
How can this vulnerability impact me? :
This vulnerability can cause a NULL pointer dereference in the Linux kernel's NFS daemon, which may lead to system instability or crashes when the affected code path is executed. Such crashes could result in denial of service conditions for systems relying on NFS exports, potentially disrupting access to shared files and services.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided CVE description does not include any information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.