CVE-2025-40324
Description
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Fix crash in nfsd4_read_release()
When tracing is enabled, the trace_nfsd_read_done trace point crashes during the pynfs read.testNoFh test.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A crash in the Linux kernel's NFSD nfsd4_read_release() function occurs when tracing is enabled and a READ request lacks a file handle.
Vulnerability
CVE-2025-40324 describes a NULL pointer dereference or similar crash in the Linux kernel's NFS server (NFSD). The bug manifests in the nfsd4_read_release() function when the trace_nfsd_read_done trace point is active. The crash is triggered by a READ operation that does not include a valid file handle, as exercised by the pynfs read.testNoFh test.
Exploitation
An attacker must be able to send NFSv4 READ requests to a vulnerable server. The attack requires that kernel tracing (e.g., via ftrace or tracepoints) is enabled on the server, which is not a default configuration. The attacker does not need authentication if the NFS export allows anonymous access; the testNoFh test sends a READ with no file handle, which the server attempts to process.
Impact
Successful exploitation causes a kernel panic or oops, leading to a denial of service (DoS) of the NFS server and potentially the entire host. There is no indication of privilege escalation or data corruption.
Mitigation
The vulnerability is fixed in the Linux kernel stable tree. Patches are available in commits [1], [2], and [3] for various stable kernel versions. Administrators should apply the latest stable kernel updates or disable NFS tracing if an immediate patch cannot be deployed.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
7930cb4fe3ab4375fdd8993ce2ac46606b2cc03524ccff698a4948875ed058f244b773c63abb1f08a2121Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/03524ccff698d4a77d096ed529073d91f5edee5dnvd
- git.kernel.org/stable/c/2ac46606b2cc49e78d8e3d8f2685e79e9ba73020nvd
- git.kernel.org/stable/c/375fdd8993cecc48afa359728a6e70b280dde1c8nvd
- git.kernel.org/stable/c/8f244b773c63fa480c9a3bd1ae04f5272f285e89nvd
- git.kernel.org/stable/c/930cb4fe3ab4061be31f20ee30bb72a66f7bb6d1nvd
- git.kernel.org/stable/c/a4948875ed0599c037dc438c11891c9012721b1dnvd
- git.kernel.org/stable/c/abb1f08a2121dd270193746e43b2a9373db9ad84nvd
News mentions
0No linked articles in our index yet.