- Description
 - In the Linux kernel, the following vulnerability has been resolved: NFSD: fix hang in nfsd4_shutdown_callback If nfs4_client is in courtesy state then there is no point to send the callback. This causes nfsd4_shutdown_callback to hang since cl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP notifies NFSD that the connection was dropped. This patch modifies nfsd4_run_cb_work to skip the RPC call if nfs4_client is in courtesy state.
 - Source
 - 416baaa9-dc9f-4396-8d5f-8c081fb06d67
 - NVD status
 - Modified
 - Products
 - linux_kernel
 
CVSS 3.1
- Type
 - Primary
 - Base score
 - 5.5
 - Impact score
 - 3.6
 - Exploitability score
 - 1.8
 - Vector string
 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
 - Severity
 - MEDIUM
 
- Hype score
 - Not currently trending
 
CVE-2025-21795 In the Linux kernel, the following vulnerability has been resolved: NFSD: fix hang in nfsd4_shutdown_callback If nfs4_client is in courtesy state then there is no p… https://t.co/SzUljE49Lj
@CVEnew
27 Feb 2025
188 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-21795 In the Linux kernel, the following vulnerability has been resolved: NFSD https://t.co/0TN1c8VhXp
@VulmonFeeds
27 Feb 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
  {
    "nodes": [
      {
        "negate": false,
        "cpeMatch": [
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "D4BB38DD-63BF-4CE7-B8DF-F7C5D678CC41",
            "versionEndExcluding": "5.10.235",
            "versionStartIncluding": "5.10.220"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "90BD6495-A356-4D15-B705-7922FE2BBD66",
            "versionEndExcluding": "5.15.179",
            "versionStartIncluding": "5.15.154"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "EE25DF79-9FB2-4DE2-93D0-BF8587BF37CA",
            "versionEndExcluding": "6.1.129",
            "versionStartIncluding": "5.19"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "B16AADE5-B2FD-4C14-B4E4-85E8EDAFE775",
            "versionEndExcluding": "6.6.79",
            "versionStartIncluding": "6.2"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "13C8DB18-FC60-425F-84E5-3EDDEC61B2FC",
            "versionEndExcluding": "6.12.16",
            "versionStartIncluding": "6.7"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "2A2093ED-74A9-43F9-AC72-50030F374EA4",
            "versionEndExcluding": "6.13.4",
            "versionStartIncluding": "6.13"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
          }
        ],
        "operator": "OR"
      }
    ]
  }
]