CVE-2025-37871
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/05/2025
Last modified:
12/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
nfsd: decrease sc_count directly if fail to queue dl_recall<br />
<br />
A deadlock warning occurred when invoking nfs4_put_stid following a failed<br />
dl_recall queue operation:<br />
T1 T2<br />
nfs4_laundromat<br />
nfs4_get_client_reaplist<br />
nfs4_anylock_blockers<br />
__break_lease<br />
spin_lock // ctx->flc_lock<br />
spin_lock // clp->cl_lock<br />
nfs4_lockowner_has_blockers<br />
locks_owner_has_blockers<br />
spin_lock // flctx->flc_lock<br />
nfsd_break_deleg_cb<br />
nfsd_break_one_deleg<br />
nfs4_put_stid<br />
refcount_dec_and_lock<br />
spin_lock // clp->cl_lock<br />
<br />
When a file is opened, an nfs4_delegation is allocated with sc_count<br />
initialized to 1, and the file_lease holds a reference to the delegation.<br />
The file_lease is then associated with the file through kernel_setlease.<br />
<br />
The disassociation is performed in nfsd4_delegreturn via the following<br />
call chain:<br />
nfsd4_delegreturn --> destroy_delegation --> destroy_unhashed_deleg --><br />
nfs4_unlock_deleg_lease --> kernel_setlease --> generic_delete_lease<br />
The corresponding sc_count reference will be released after this<br />
disassociation.<br />
<br />
Since nfsd_break_one_deleg executes while holding the flc_lock, the<br />
disassociation process becomes blocked when attempting to acquire flc_lock<br />
in generic_delete_lease. This means:<br />
1) sc_count in nfsd_break_one_deleg will not be decremented to 0;<br />
2) The nfs4_put_stid called by nfsd_break_one_deleg will not attempt to<br />
acquire cl_lock;<br />
3) Consequently, no deadlock condition is created.<br />
<br />
Given that sc_count in nfsd_break_one_deleg remains non-zero, we can<br />
safely perform refcount_dec on sc_count directly. This approach<br />
effectively avoids triggering deadlock warnings.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.23 (including) | 6.12.25 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13.11 (including) | 6.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14.2 (including) | 6.14.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.10.236:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15.180:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1.134:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.6.87:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/14985d66b9b99c12995dd99d1c6c8dec4114c2a5
- https://git.kernel.org/stable/c/7d192e27a431026c58d60edf66dc6cd98d0c01fc
- https://git.kernel.org/stable/c/a1d14d931bf700c1025db8c46d6731aa5cf440f9
- https://git.kernel.org/stable/c/a70832d3555987035fc430ccd703acd89393eadb
- https://git.kernel.org/stable/c/a7fce086f6ca84db409b9d58493ea77c1978897c
- https://git.kernel.org/stable/c/b9bbe8f9d5663311d06667ce36d6ed255ead1a26
- https://git.kernel.org/stable/c/ba903539fff745d592d893c71b30e5e268a95413
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



