CVE-2025-37871

Source
https://cve.org/CVERecord?id=CVE-2025-37871
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37871.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37871
Downstream
Related
Published
2025-05-09T06:43:59.720Z
Modified
2026-03-20T12:42:31.969971Z
Summary
nfsd: decrease sc_count directly if fail to queue dl_recall
Details

In the Linux kernel, the following vulnerability has been resolved:

nfsd: decrease sccount directly if fail to queue dlrecall

A deadlock warning occurred when invoking nfs4putstid following a failed dlrecall queue operation: T1 T2 nfs4laundromat nfs4getclientreaplist nfs4anylock_blockers __breaklease spinlock // ctx->flclock spinlock // clp->cllock nfs4lockownerhasblockers locksownerhasblockers spinlock // flctx->flclock nfsdbreakdelegcb nfsdbreakonedeleg nfs4putstid refcountdecandlock spinlock // clp->cllock

When a file is opened, an nfs4delegation is allocated with sccount initialized to 1, and the filelease holds a reference to the delegation. The filelease is then associated with the file through kernel_setlease.

The disassociation is performed in nfsd4delegreturn via the following call chain: nfsd4delegreturn --> destroydelegation --> destroyunhasheddeleg --> nfs4unlockdeleglease --> kernelsetlease --> genericdeletelease The corresponding sccount reference will be released after this disassociation.

Since nfsdbreakonedeleg executes while holding the flclock, the disassociation process becomes blocked when attempting to acquire flclock in genericdeletelease. This means: 1) sccount in nfsdbreakonedeleg will not be decremented to 0; 2) The nfs4putstid called by nfsdbreakonedeleg will not attempt to acquire cl_lock; 3) Consequently, no deadlock condition is created.

Given that sccount in nfsdbreakonedeleg remains non-zero, we can safely perform refcountdec on sccount directly. This approach effectively avoids triggering deadlock warnings.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37871.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b874cdef4e67e5150e07eff0eae1cbb21fb92da1
Fixed
b9bbe8f9d5663311d06667ce36d6ed255ead1a26
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cdb796137c57e68ca34518d53be53b679351eb86
Fixed
a70832d3555987035fc430ccd703acd89393eadb
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d96587cc93ec369031bcd7658c6adc719873c9fd
Fixed
ba903539fff745d592d893c71b30e5e268a95413
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9a81cde8c7ce65dd90fb47ceea93a45fc1a2fbd1
Fixed
7d192e27a431026c58d60edf66dc6cd98d0c01fc
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cad3479b63661a399c9df1d0b759e1806e2df3c8
Fixed
a7fce086f6ca84db409b9d58493ea77c1978897c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
133f5e2a37ce08c82d24e8fba65e0a81deae4609
Fixed
14985d66b9b99c12995dd99d1c6c8dec4114c2a5
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
230ca758453c63bd38e4d9f4a21db698f7abada8
Fixed
a1d14d931bf700c1025db8c46d6731aa5cf440f9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
63b91c8ff4589f5263873b24c052447a28e10ef7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37871.json"