CVE-2026-43470
Directory Alias Handling Flaw in Linux Kernel
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| lustre | lustre_racer | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's NFS (Network File System) implementation. Specifically, when creating files using NFS version 3, if an alias found during the creation process happens to be a directory, the system does not return an error as it should. Instead, it ignores the alias but leaves the original directory entry (dentry) in a negative state.
Later, this negative dentry causes a kernel oops (a type of crash) during file open operations because the system attempts to perform file operations on what it thinks is a file but is actually a directory. This issue was observed in scenarios where directories and files are created and removed concurrently with the same name, especially when exclusive file opening flags are not used.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel oops) when performing certain file operations over NFS. Such crashes can lead to system instability, potential denial of service, and disruption of services relying on NFS file operations.