NFSD: Hold net reference for the lifetime of /proc/fs/nfs/exports fd

Summary

CVECVE-2026-31403
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-04-03 16:16:39 UTC
Updated2026-04-03 16:16:39 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: NFSD: Hold net reference for the lifetime of /proc/fs/nfs/exports fd The /proc/fs/nfs/exports proc entry is created at module init and persists for the module's lifetime. exports_proc_open() captures the caller's current network namespace and stores its svc_export_cache in seq->private, but takes no reference on the namespace. If the namespace is subsequently torn down (e.g. container destruction after the opener does setns() to a different namespace), nfsd_net_exit() calls nfsd_export_shutdown() which frees the cache. Subsequent reads on the still-open fd dereference the freed cache_detail, walking a freed hash table. Hold a reference on the struct net for the lifetime of the open file descriptor. This prevents nfsd_net_exit() from running -- and thus prevents nfsd_export_shutdown() from freeing the cache -- while any exports fd is open. cache_detail already stores its net pointer (cd->net, set by cache_create_net()), so exports_release() can retrieve it without additional per-file storage.

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected 96d851c4d28de8cc83fe2bd5c6bc2eb8f253a6c5 c7f406fb341d6747634b8b1fa5461656e5e56076 git Not specified
CNA Linux Linux affected 96d851c4d28de8cc83fe2bd5c6bc2eb8f253a6c5 d1a19217995df9c7e4118f5a2820c5032fef2945 git Not specified
CNA Linux Linux affected 96d851c4d28de8cc83fe2bd5c6bc2eb8f253a6c5 e3d77f935639e6ae4b381c80464c31df998d61f4 git Not specified
CNA Linux Linux affected 96d851c4d28de8cc83fe2bd5c6bc2eb8f253a6c5 db4a9f99b12a7ee1c19d86c83a3b752c7effa6c6 git Not specified
CNA Linux Linux affected 96d851c4d28de8cc83fe2bd5c6bc2eb8f253a6c5 6a8d70e2ad6aad2c345a5048edcb8168036f97d6 git Not specified
CNA Linux Linux affected 96d851c4d28de8cc83fe2bd5c6bc2eb8f253a6c5 e7fcf179b82d3a3730fd8615da01b087cc654d0b git Not specified
CNA Linux Linux affected 3.9 Not specified
CNA Linux Linux unaffected 3.9 semver Not specified
CNA Linux Linux unaffected 6.1.167 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.130 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.78 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.20 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.10 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0-rc5 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/db4a9f99b12a7ee1c19d86c83a3b752c7effa6c6 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/e3d77f935639e6ae4b381c80464c31df998d61f4 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/e7fcf179b82d3a3730fd8615da01b087cc654d0b 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/c7f406fb341d6747634b8b1fa5461656e5e56076 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/6a8d70e2ad6aad2c345a5048edcb8168036f97d6 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/d1a19217995df9c7e4118f5a2820c5032fef2945 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report