CVE-2025-38567

4.7 MEDIUM

📋 TL;DR

A race condition in the Linux kernel's NFS server (nfsd) can cause a reference count leak when multiple processes attempt to open local file handles simultaneously. This leads to a memory leak that prevents the NFS server from shutting down cleanly, causing system hangs during shutdown. Only systems running the Linux kernel with NFS server enabled are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific kernel versions containing the vulnerable code (check git commits for exact ranges)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if NFS server (nfsd) is enabled and running. Most desktop systems not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System becomes unresponsive during shutdown/reboot, requiring hard reset which could lead to filesystem corruption or data loss.

🟠

Likely Case

NFS server shutdown hangs indefinitely, requiring manual intervention to restart the system.

🟢

If Mitigated

No security impact, only availability impact during controlled shutdown scenarios.

🌐 Internet-Facing: LOW - This is a local DoS during shutdown only, not remotely exploitable for privilege escalation or data access.
🏢 Internal Only: LOW - Requires local access and specific timing conditions to trigger the race condition.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires race condition timing and local access to trigger. Not a security vulnerability but a reliability issue.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits c4bf8f26c51e51bbb840935659a7b3b65a802c07, e5a73150776f18547ee685c9f6bfafe549714899, or fcb0a417fddb605530c4837e0996620f8ed38023

Vendor Advisory: https://git.kernel.org/stable/c/c4bf8f26c51e51bbb840935659a7b3b65a802c07

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable NFS server

all

If NFS server functionality is not required, disable it to eliminate vulnerability.

systemctl stop nfs-server
systemctl disable nfs-server

🧯 If You Can't Patch

  • Avoid shutting down NFS server while active connections exist
  • Use graceful shutdown procedures and monitor for hanging processes

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if NFS server is running: 'systemctl status nfs-server' and 'uname -r'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and test NFS server shutdown: 'systemctl stop nfs-server' should complete without hanging

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing nfsd shutdown hanging
  • System logs showing extended shutdown times

Network Indicators:

  • NFS server failing to stop cleanly

SIEM Query:

source="kernel" AND "nfsd" AND ("shutdown" OR "hang")

🔗 References

📤 Share & Export