CVE-2025-71090

Source
https://cve.org/CVERecord?id=CVE-2025-71090
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71090.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-71090
Downstream
Published
2026-01-13T15:34:51.777Z
Modified
2026-02-09T19:34:09.207825Z
Summary
nfsd: fix nfsd_file reference leak in nfsd4_add_rdaccess_to_wrdeleg()
Details

In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix nfsdfile reference leak in nfsd4addrdaccessto_wrdeleg()

nfsd4addrdaccesstowrdeleg() unconditionally overwrites fp->fifds[ORDONLY] with a newly acquired nfsdfile. However, if the client already has a SHAREACCESS_READ open from a previous OPEN operation, this action overwrites the existing pointer without releasing its reference, orphaning the previous reference.

Additionally, the function originally stored the same nfsdfile pointer in both fp->fifds[ORDONLY] and fp->firdelegfile with only a single reference. When putdelegfile() runs, it clears firdelegfile and calls nfs4fileputaccess() to release the file.

However, nfs4fileputaccess() only releases fifds[ORDONLY] when the fiaccess[ORDONLY] counter drops to zero. If another READ open exists on the file, the counter remains elevated and the nfsdfile reference from the delegation is never released. This potentially causes open conflicts on that file.

Then, on server shutdown, these leaks cause _nfsdfilecachepurge() to encounter files with an elevated reference count that cannot be cleaned up, ultimately triggering a BUG() in kmemcachedestroy() because there are still nfsd_file objects allocated in that cache.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71090.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e7a8ebc305f26cab608e59a916a4ae89d6656c5f
Fixed
c07dc84ed67c5a182273171639bacbbb87c12175
Fixed
8072e34e1387d03102b788677d491e2bcceef6f5

Affected versions

v6.*
v6.16
v6.16-rc7
v6.17
v6.17-rc1
v6.17-rc2
v6.17-rc3
v6.17-rc4
v6.17-rc5
v6.17-rc6
v6.17-rc7
v6.18
v6.18-rc1
v6.18-rc2
v6.18-rc3
v6.18-rc4
v6.18-rc5
v6.18-rc6
v6.18-rc7
v6.18.1
v6.18.2
v6.18.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71090.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.17.0
Fixed
6.18.4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71090.json"