-
CVE-2026-22980
- EPSS 0.03%
- Veröffentlicht 23.01.2026 15:24:02
- Zuletzt bearbeitet 26.01.2026 15:03:51
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: nfsd: provide locking for v4_end_grace Writing to v4_end_grace can race with server shutdown and result in memory being accessed after it was freed - reclaim_str_hashtbl in particularly. We cannot hold nfsd_mutex across the nfsd4_end_grace() call as that is held while client_tracking_op->init() is called and that can wait for an upcall to nfsdcltrack which can write to v4_end_grace, resulting in a deadlock. nfsd4_end_grace() is also called by the landromat work queue and this doesn't require locking as server shutdown will stop the work and wait for it before freeing anything that nfsd4_end_grace() might access. However, we must be sure that writing to v4_end_grace doesn't restart the work item after shutdown has already waited for it. For this we add a new flag protected with nn->client_lock. It is set only while it is safe to make client tracking calls, and v4_end_grace only schedules work while the flag is set with the spinlock held. So this patch adds a nfsd_net field "client_tracking_active" which is set as described. Another field "grace_end_forced", is set when v4_end_grace is written. After this is set, and providing client_tracking_active is set, the laundromat is scheduled. This "grace_end_forced" field bypasses other checks for whether the grace period has finished. This resolves a race which can result in use-after-free.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
ca97360860eb02e3ae4ba42c19b439a0fcecbf06
Version
7f5ef2e900d9462bf9cffaf6bb246ed87a20a6d6
Status
affected
Version <
e8bfa2401d4c51eca6e48e9b33c798828ca9df61
Version
7f5ef2e900d9462bf9cffaf6bb246ed87a20a6d6
Status
affected
Version <
34eb22836e0cdba093baac66599d68c4cd245a9d
Version
7f5ef2e900d9462bf9cffaf6bb246ed87a20a6d6
Status
affected
Version <
06600719d0f7a723811c45e4d51f5b742f345309
Version
7f5ef2e900d9462bf9cffaf6bb246ed87a20a6d6
Status
affected
Version <
ba4811c8b433bfa681729ca42cc62b6034f223b0
Version
7f5ef2e900d9462bf9cffaf6bb246ed87a20a6d6
Status
affected
Version <
53f07d095e7e680c5e4569a55a019f2c0348cdc6
Version
7f5ef2e900d9462bf9cffaf6bb246ed87a20a6d6
Status
affected
Version <
2857bd59feb63fcf40fe4baf55401baea6b4feb4
Version
7f5ef2e900d9462bf9cffaf6bb246ed87a20a6d6
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.18
Status
affected
Version <
3.18
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.248
Status
unaffected
Version <=
5.15.*
Version
5.15.198
Status
unaffected
Version <=
6.1.*
Version
6.1.161
Status
unaffected
Version <=
6.6.*
Version
6.6.121
Status
unaffected
Version <=
6.12.*
Version
6.12.66
Status
unaffected
Version <=
6.18.*
Version
6.18.6
Status
unaffected
Version <=
*
Version
6.19-rc5
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.088 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|