VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68185

CVE-2025-68185

Description

In the Linux kernel, the following vulnerability has been resolved:

nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode dereferencing

Theoretically it's an oopsable race, but I don't believe one can manage to hit it on real hardware; might become doable on a KVM, but it still won't be easy to attack.

Anyway, it's easy to deal with - since xdr_encode_hyper() is just a call of put_unaligned_be64(), we can put that under ->d_lock and be done with that.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Insufficient locking in nfs4_setup_readdir() leads to a race condition when dereferencing ->d_parent->d_inode, potentially causing an oops.

Vulnerability

In the Linux kernel, the function nfs4_setup_readdir() lacks proper locking when dereferencing the inode of the parent directory (->d_parent->d_inode). This insufficient locking can theoretically lead to a race condition, potentially resulting in a kernel oops if the parent directory's inode is accessed concurrently and becomes invalid or changed.

Exploitation

The race is considered difficult to exploit on real hardware, though it may become more feasible in virtualized environments such as KVM. The attack requires precise timing and likely local access to trigger the race. No authentication is needed beyond the ability to perform NFS directory reads that invoke the vulnerable code path.

Impact

If successfully triggered, an attacker could cause a kernel panic (oops), leading to denial of service. Given the theoretical nature and difficulty of exploitation, the practical risk is low, but the vulnerability is still addressed in kernel stable updates.

Mitigation

The fix is straightforward: by wrapping the dereference and subsequent xdr_encode_hyper() call under ->d_lock, the race is eliminated. Patches have been applied to the stable kernel tree as commit [1] and backported to various stable branches. Users should update to the latest stable kernel to mitigate this issue.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.