CVE-2025-21795
Description
In the Linux kernel, the following vulnerability has been resolved:
NFSD: fix hang in nfsd4_shutdown_callback
If nfs4_client is in courtesy state then there is no point to send the callback. This causes nfsd4_shutdown_callback to hang since cl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP notifies NFSD that the connection was dropped.
This patch modifies nfsd4_run_cb_work to skip the RPC call if nfs4_client is in courtesy state.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
NFSD callback hang during shutdown when client in courtesy state causes 15-minute delay; fix skips callback for courtesy clients.
Root
Cause The NFS server's callback mechanism incorrectly attempts to send a callback to an NFS client that is in the "courtesy" state. During shutdown (nfsd4_shutdown_callback), the callback work item is still pending (cl_cb_inflight non-zero) even though the client no longer requires callback completion. This causes a hang of approximately 15 minutes until the TCP connection times out. The Linux kernel fix modifies nfsd4_run_cb_work to skip the RPC call when the client is in courtesy state. [3][4]
Exploitation
No special authentication or network position is required beyond having an NFS client that enters the courtesy state (e.g., after a client disconnection). The hang occurs on the server side, affecting all NFSv4.1+ services served by the same NFS daemon. Any NFS client that transitions to courtesy state can trigger the condition, making it a denial-of-service vector against the NFS server.
Impact
An attacker with the ability to bring an NFS client into a courtesy state (or cause such a state transition) can cause the NFS server to hang for the duration of the TCP timeout (approximately 15 minutes). This effectively denies service to all clients. The vulnerability has a CVSS score of 5.5 (Medium), reflecting the availability impact.
Mitigation
The fix has been included in the Linux kernel stable branches. Affected versions are all kernels without the patch. Additionally, Siemens lists this CVE in advisories affecting products using Linux, such as the SIMATIC S7-1500 family with GNU/Linux subsystem (see [1] and [2]). Users should apply the latest kernel updates or vendor patches to remediate.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
139- osv-coords137 versionspkg:deb/ubuntu/linux-aws@6.11.0-1014.15?arch=source&distro=oracularpkg:rpm/almalinux/kernelpkg:rpm/almalinux/kernel-64kpkg:rpm/almalinux/kernel-64k-corepkg:rpm/almalinux/kernel-64k-debugpkg:rpm/almalinux/kernel-64k-debug-corepkg:rpm/almalinux/kernel-64k-debug-develpkg:rpm/almalinux/kernel-64k-debug-devel-matchedpkg:rpm/almalinux/kernel-64k-debug-modulespkg:rpm/almalinux/kernel-64k-debug-modules-corepkg:rpm/almalinux/kernel-64k-debug-modules-extrapkg:rpm/almalinux/kernel-64k-develpkg:rpm/almalinux/kernel-64k-devel-matchedpkg:rpm/almalinux/kernel-64k-modulespkg:rpm/almalinux/kernel-64k-modules-corepkg:rpm/almalinux/kernel-64k-modules-extrapkg:rpm/almalinux/kernel-abi-stablelistspkg:rpm/almalinux/kernel-corepkg:rpm/almalinux/kernel-cross-headerspkg:rpm/almalinux/kernel-debugpkg:rpm/almalinux/kernel-debug-corepkg:rpm/almalinux/kernel-debug-develpkg:rpm/almalinux/kernel-debug-devel-matchedpkg:rpm/almalinux/kernel-debug-modulespkg:rpm/almalinux/kernel-debug-modules-corepkg:rpm/almalinux/kernel-debug-modules-extrapkg:rpm/almalinux/kernel-debug-uki-virtpkg:rpm/almalinux/kernel-develpkg:rpm/almalinux/kernel-devel-matchedpkg:rpm/almalinux/kernel-docpkg:rpm/almalinux/kernel-headerspkg:rpm/almalinux/kernel-modulespkg:rpm/almalinux/kernel-modules-corepkg:rpm/almalinux/kernel-modules-extrapkg:rpm/almalinux/kernel-modules-extra-matchedpkg:rpm/almalinux/kernel-rtpkg:rpm/almalinux/kernel-rt-64kpkg:rpm/almalinux/kernel-rt-64k-corepkg:rpm/almalinux/kernel-rt-64k-debugpkg:rpm/almalinux/kernel-rt-64k-debug-corepkg:rpm/almalinux/kernel-rt-64k-debug-develpkg:rpm/almalinux/kernel-rt-64k-debug-modulespkg:rpm/almalinux/kernel-rt-64k-debug-modules-corepkg:rpm/almalinux/kernel-rt-64k-debug-modules-extrapkg:rpm/almalinux/kernel-rt-64k-develpkg:rpm/almalinux/kernel-rt-64k-modulespkg:rpm/almalinux/kernel-rt-64k-modules-corepkg:rpm/almalinux/kernel-rt-64k-modules-extrapkg:rpm/almalinux/kernel-rt-corepkg:rpm/almalinux/kernel-rt-debugpkg:rpm/almalinux/kernel-rt-debug-corepkg:rpm/almalinux/kernel-rt-debug-develpkg:rpm/almalinux/kernel-rt-debug-modulespkg:rpm/almalinux/kernel-rt-debug-modules-corepkg:rpm/almalinux/kernel-rt-debug-modules-extrapkg:rpm/almalinux/kernel-rt-develpkg:rpm/almalinux/kernel-rt-modulespkg:rpm/almalinux/kernel-rt-modules-corepkg:rpm/almalinux/kernel-rt-modules-extrapkg:rpm/almalinux/kernel-toolspkg:rpm/almalinux/kernel-tools-libspkg:rpm/almalinux/kernel-tools-libs-develpkg:rpm/almalinux/kernel-uki-virtpkg:rpm/almalinux/kernel-uki-virt-addonspkg:rpm/almalinux/kernel-zfcpdumppkg:rpm/almalinux/kernel-zfcpdump-corepkg:rpm/almalinux/kernel-zfcpdump-develpkg:rpm/almalinux/kernel-zfcpdump-devel-matchedpkg:rpm/almalinux/kernel-zfcpdump-modulespkg:rpm/almalinux/kernel-zfcpdump-modules-corepkg:rpm/almalinux/kernel-zfcpdump-modules-extrapkg:rpm/almalinux/libperfpkg:rpm/almalinux/perfpkg:rpm/almalinux/python3-perfpkg:rpm/almalinux/rtlapkg:rpm/almalinux/rvpkg:rpm/opensuse/dtb-aarch64&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-64kb&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-azure&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-default-base&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-rt_debug&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-rt&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-source-azure&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-source-rt&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-syms-azure&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-syms-rt&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/kernel-zfcpdump&distro=openSUSE%20Leap%2015.6pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP6pkg:rpm/suse/kernel-coco_debug&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Confidential%20Computing%20Technical%20Preview%2015%20SP6pkg:rpm/suse/kernel-coco&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Confidential%20Computing%20Technical%20Preview%2015%20SP6pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Micro%206.0pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Micro%206.1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP6pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP6pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP6pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Micro%206.0pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Micro%206.1pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6pkg:rpm/suse/kernel-kvmsmall&distro=SUSE%20Linux%20Micro%206.0pkg:rpm/suse/kernel-kvmsmall&distro=SUSE%20Linux%20Micro%206.1pkg:rpm/suse/kernel-livepatch-MICRO-6-0-RT_Update_6&distro=SUSE%20Linux%20Micro%206.0pkg:rpm/suse/kernel-livepatch-MICRO-6-0-RT_Update_6&distro=SUSE%20Linux%20Micro%206.1pkg:rpm/suse/kernel-livepatch-MICRO-6-0_Update_6&distro=SUSE%20Linux%20Micro%206.0pkg:rpm/suse/kernel-livepatch-MICRO-6-0_Update_6&distro=SUSE%20Linux%20Micro%206.1pkg:rpm/suse/kernel-livepatch-SLE15-SP6-RT_Update_9&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6pkg:rpm/suse/kernel-livepatch-SLE15-SP6_Update_9&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP6pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Micro%206.0pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Micro%206.1pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP6pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP6pkg:rpm/suse/kernel-source-coco&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Confidential%20Computing%20Technical%20Preview%2015%20SP6pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Micro%206.0pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Micro%206.1pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Micro%206.0pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Micro%206.1pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP6pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP6pkg:rpm/suse/kernel-syms-coco&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Confidential%20Computing%20Technical%20Preview%2015%20SP6pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP6pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6
< 6.11.0-1014.15+ 136 more
- (no CPE)range: < 6.11.0-1014.15
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.12.0-124.8.1.el10_1
- (no CPE)range: < 6.4.0-150600.23.42.1
- (no CPE)range: < 6.4.0-150600.23.42.2
- (no CPE)range: < 6.4.0-150600.8.31.1
- (no CPE)range: < 6.4.0-150600.23.42.2
- (no CPE)range: < 6.4.0-150600.23.42.2.150600.12.18.4
- (no CPE)range: < 6.4.0-150600.23.42.2
- (no CPE)range: < 6.4.0-150600.23.42.1
- (no CPE)range: < 6.4.0-150600.23.42.2
- (no CPE)range: < 6.4.0-150600.23.42.2
- (no CPE)range: < 6.4.0-150600.23.42.1
- (no CPE)range: < 6.4.0-150600.10.29.1
- (no CPE)range: < 6.4.0-150600.10.29.1
- (no CPE)range: < 6.4.0-150600.8.31.1
- (no CPE)range: < 6.4.0-150600.23.42.1
- (no CPE)range: < 6.4.0-150600.10.29.1
- (no CPE)range: < 6.4.0-150600.8.31.1
- (no CPE)range: < 6.4.0-150600.23.42.1
- (no CPE)range: < 6.4.0-150600.10.29.1
- (no CPE)range: < 6.4.0-150600.23.42.2
- (no CPE)range: < 6.4.0-150600.23.42.2
- (no CPE)range: < 6.4.0-150600.8.31.1
- (no CPE)range: < 6.4.0-15061.21.coco15sp6.1
- (no CPE)range: < 6.4.0-15061.21.coco15sp6.1
- (no CPE)range: < 6.4.0-150600.23.42.2.150600.12.18.4
- (no CPE)range: < 6.4.0-28.1.21.6
- (no CPE)range: < 6.4.0-28.1.21.6
- (no CPE)range: < 6.4.0-150600.23.42.2
- (no CPE)range: < 6.4.0-150600.23.42.2
- (no CPE)range: < 6.4.0-150600.23.42.2
- (no CPE)range: < 6.4.0-150600.23.42.2
- (no CPE)range: < 6.4.0-150600.23.42.2
- (no CPE)range: < 6.4.0-28.1
- (no CPE)range: < 6.4.0-28.1
- (no CPE)range: < 6.4.0-150600.23.42.1
- (no CPE)range: < 6.4.0-28.1
- (no CPE)range: < 6.4.0-28.1
- (no CPE)range: < 1-3.1
- (no CPE)range: < 1-3.1
- (no CPE)range: < 1-3.1
- (no CPE)range: < 1-3.1
- (no CPE)range: < 1-150600.1.3.2
- (no CPE)range: < 1-150600.13.3.4
- (no CPE)range: < 6.4.0-150600.23.42.2
- (no CPE)range: < 6.4.0-150600.10.29.1
- (no CPE)range: < 6.4.0-28.1
- (no CPE)range: < 6.4.0-28.1
- (no CPE)range: < 6.4.0-150600.10.29.1
- (no CPE)range: < 6.4.0-150600.8.31.1
- (no CPE)range: < 6.4.0-15061.21.coco15sp6.1
- (no CPE)range: < 6.4.0-150600.23.42.1
- (no CPE)range: < 6.4.0-150600.23.42.1
- (no CPE)range: < 6.4.0-28.1
- (no CPE)range: < 6.4.0-28.1
- (no CPE)range: < 6.4.0-28.1
- (no CPE)range: < 6.4.0-28.1
- (no CPE)range: < 6.4.0-150600.10.29.1
- (no CPE)range: < 6.4.0-150600.8.31.1
- (no CPE)range: < 6.4.0-15061.21.coco15sp6.1
- (no CPE)range: < 6.4.0-150600.23.42.1
- (no CPE)range: < 6.4.0-150600.10.29.1
- (no CPE)range: < 6.4.0-150600.23.42.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- git.kernel.org/stable/c/036ac2778f7b28885814c6fbc07e156ad1624d03nvdPatch
- git.kernel.org/stable/c/23ad7797c74cd8f7f90617f1e59a8703e2b43908nvdPatch
- git.kernel.org/stable/c/38d345f612503b850c2973e5a879f88e441b34d7nvdPatch
- git.kernel.org/stable/c/abed68027ea3ab893ac85cc46a00e2e64a324239nvdPatch
- git.kernel.org/stable/c/cedfbb92cf97a6bff3d25633001d9c44442ee854nvdPatch
- git.kernel.org/stable/c/e88d2451cd42e025465d6b51fd716a47b0b3800dnvdPatch
- git.kernel.org/stable/c/efa8a261c575f816c7e79a87aeb3ef8a0bd6b221nvdPatch
- cert-portal.siemens.com/productcert/html/ssa-082556.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-265688.htmlnvd
- lists.debian.org/debian-lts-announce/2025/03/msg00028.htmlnvd
- lists.debian.org/debian-lts-announce/2025/05/msg00030.htmlnvd
News mentions
0No linked articles in our index yet.