VYPR
Unrated severityNVD Advisory· Published Dec 8, 2025· Updated Apr 15, 2026

CVE-2025-40324

CVE-2025-40324

Description

In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix crash in nfsd4_read_release()

When tracing is enabled, the trace_nfsd_read_done trace point crashes during the pynfs read.testNoFh test.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A crash in the Linux kernel's NFSD nfsd4_read_release() function occurs when tracing is enabled and a READ request lacks a file handle.

Vulnerability

CVE-2025-40324 describes a NULL pointer dereference or similar crash in the Linux kernel's NFS server (NFSD). The bug manifests in the nfsd4_read_release() function when the trace_nfsd_read_done trace point is active. The crash is triggered by a READ operation that does not include a valid file handle, as exercised by the pynfs read.testNoFh test.

Exploitation

An attacker must be able to send NFSv4 READ requests to a vulnerable server. The attack requires that kernel tracing (e.g., via ftrace or tracepoints) is enabled on the server, which is not a default configuration. The attacker does not need authentication if the NFS export allows anonymous access; the testNoFh test sends a READ with no file handle, which the server attempts to process.

Impact

Successful exploitation causes a kernel panic or oops, leading to a denial of service (DoS) of the NFS server and potentially the entire host. There is no indication of privilege escalation or data corruption.

Mitigation

The vulnerability is fixed in the Linux kernel stable tree. Patches are available in commits [1], [2], and [3] for various stable kernel versions. Administrators should apply the latest stable kernel updates or disable NFS tracing if an immediate patch cannot be deployed.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.