CVE-2026-23297

Source
https://cve.org/CVERecord?id=CVE-2026-23297
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23297.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23297
Downstream
Related
Published
2026-03-25T10:26:54.156Z
Modified
2026-04-22T08:29:22.533763106Z
Summary
nfsd: Fix cred ref leak in nfsd_nl_threads_set_doit().
Details

In the Linux kernel, the following vulnerability has been resolved:

nfsd: Fix cred ref leak in nfsdnlthreadssetdoit().

syzbot reported memory leak of struct cred. [0]

nfsdnlthreadssetdoit() passes getcurrentcred() to nfsdsvc(), but putcred() is not called after that.

The cred is finally passed down to svcxprtcreate(), which calls getcred() with the cred for struct svc_xprt.

The ownership of the refcount by getcurrentcred() is not transferred to anywhere and is just leaked.

nfsdsvc() is also called from writethreads(), but it does not bump file->f_cred there.

nfsdnlthreadssetdoit() is called from sendmsg() and current->cred does not go away.

Let's use currentcred() in nfsdnlthreadsset_doit().

unreferenced object 0xffff888108b89480 (size 184): comm "syz-executor", pid 5994, jiffies 4294943386 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 369454a7): kmemleakallocrecursive include/linux/kmemleak.h:44 [inline] slabpostallochook mm/slub.c:4958 [inline] slaballocnode mm/slub.c:5263 [inline] kmemcacheallocnoprof+0x412/0x580 mm/slub.c:5270 preparecreds+0x22/0x600 kernel/cred.c:185 copycreds+0x44/0x290 kernel/cred.c:286 copyprocess+0x7a7/0x2870 kernel/fork.c:2086 kernelclone+0xac/0x6e0 kernel/fork.c:2651 __dosysclone+0x7f/0xb0 kernel/fork.c:2792 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline] dosyscall64+0xa4/0xf80 arch/x86/entry/syscall64.c:94 entrySYSCALL64afterhwframe+0x77/0x7f

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23297.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
924f4fb003ba114c60b3c07a011dcd86a8956cd1
Fixed
41170716421c25cd20b39e83f0e0762e212b377b
Fixed
27c13c5bb0948e3b5c64e59f8a903231896fab9b
Fixed
a3f88e3e18b51a7f654189189c762ebcdeaa7e29
Fixed
1cb968a2013ffa8112d52ebe605009ea1c6a582c

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23297.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.10.0
Fixed
6.12.77
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.17
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23297.json"