Home

Description

In the Linux kernel, the following vulnerability has been resolved: nfsd: Fix cred ref leak in nfsd_nl_listener_set_doit(). nfsd_nl_listener_set_doit() uses get_current_cred() without put_cred(). As we can see from other callers, svc_xprt_create_from_sa() does not require the extra refcount. nfsd_nl_listener_set_doit() is always in the process context, sendmsg(), and current->cred does not go away. Let's use current_cred() in nfsd_nl_listener_set_doit().

PUBLISHED Reserved 2026-05-01 | Published 2026-05-08 | Updated 2026-05-08 | Assigner Linux

Product status

Default status
unaffected

16a471177496c8e04a9793812c187a2c1a2192fa (git) before 02e87ec0bc706cb93fa47b43d18c4d10102c7d54
affected

16a471177496c8e04a9793812c187a2c1a2192fa (git) before 019debe5851d7355bea9ff0248cc317878924d8f
affected

16a471177496c8e04a9793812c187a2c1a2192fa (git) before cba413765376bb466035c9160fa3130402971e2c
affected

16a471177496c8e04a9793812c187a2c1a2192fa (git) before 92978c83bb4eef55d02a6c990c01c423131eefa7
affected

Default status
affected

6.10
affected

Any version before 6.10
unaffected

6.12.78 (semver)
unaffected

6.18.19 (semver)
unaffected

6.19.9 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/02e87ec0bc706cb93fa47b43d18c4d10102c7d54

git.kernel.org/...c/019debe5851d7355bea9ff0248cc317878924d8f

git.kernel.org/...c/cba413765376bb466035c9160fa3130402971e2c

git.kernel.org/...c/92978c83bb4eef55d02a6c990c01c423131eefa7

cve.org (CVE-2026-43394)

nvd.nist.gov (CVE-2026-43394)

Download JSON