The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-38199

CVE-2021-38199: Linux Kernel NFSv4 DoS Vulnerability

CVE-2021-38199 is a denial of service flaw in Linux Kernel's NFSv4 client that allows remote servers to hang mount operations. This article covers the technical details, affected versions, impact, and mitigation.

Published: February 25, 2026

CVE-2021-38199 Overview

CVE-2021-38199 is a Denial of Service vulnerability in the Linux kernel's NFSv4 client implementation. The flaw exists in fs/nfs/nfs4client.c where incorrect connection-setup ordering allows operators of remote NFSv4 servers to cause a denial of service condition by arranging for those servers to be unreachable during trunking detection, resulting in hanging NFS mounts.

Critical Impact

Remote NFSv4 server operators can exploit incorrect connection-setup ordering to cause NFS mount operations to hang indefinitely, leading to system unavailability and potential service disruption for dependent applications.

Affected Products

  • Linux Kernel (versions before 5.13.4)
  • NetApp HCI Bootstrap OS
  • NetApp HCI Compute Node
  • NetApp HCI Management Node
  • NetApp SolidFire
  • NetApp Element Software
  • NetApp HCI Storage Node
  • Debian Linux 9.0
  • Debian Linux 11.0

Discovery Timeline

  • August 8, 2021 - CVE-2021-38199 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2021-38199

Vulnerability Analysis

The vulnerability resides in the nfs4_alloc_client() function within fs/nfs/nfs4client.c. The issue stems from improper initialization ordering when establishing connections to NFSv4 servers. During the trunking detection phase, the NFS client attempts to identify if multiple server addresses belong to the same server. When this detection occurs while a target server is unreachable, the mount operation hangs indefinitely rather than failing gracefully with an appropriate timeout or error.

This race condition in the connection establishment logic creates a window where an attacker controlling or influencing NFSv4 server availability can trigger the vulnerability. The attack requires adjacent network access, meaning the attacker must have some level of network proximity to the affected systems or control over the NFSv4 server infrastructure.

Root Cause

The root cause is incorrect connection-setup ordering in the NFSv4 client code. The nfs4_alloc_client() function did not properly initialize the server connection before proceeding with trunking detection operations. This sequencing flaw means that if the server becomes unreachable at a critical point during client initialization, the mount operation enters a hung state rather than handling the failure appropriately.

Attack Vector

The attack vector requires adjacent network access. An attacker operating or compromising NFSv4 servers can exploit this vulnerability by making servers unreachable during the specific window when trunking detection occurs. This can be achieved through:

  1. Controlling the NFSv4 server and timing network disruptions
  2. Network-level attacks that make the server temporarily unreachable
  3. Manipulating server responses during the trunking detection phase

The attack results in denial of service through indefinitely hanging mount operations, which can cascade to affect applications and services dependent on the NFS mounts.

c
// Security patch from Linux Kernel commit dd99e9f
// Source: https://github.com/torvalds/linux/commit/dd99e9f98fbf423ff6d365b37a98e8879170f17c
 
struct nfs_client *nfs4_alloc_client(const struct nfs_client_initdata *cl_init)
{
-	int err;
+	char buf[INET6_ADDRSTRLEN + 1];
+	const char *ip_addr = cl_init->ip_addr;
	struct nfs_client *clp = nfs_alloc_client(cl_init);
+	int err;
+
	if (IS_ERR(clp))
		return clp;

Source: GitHub Commit dd99e9f

Detection Methods for CVE-2021-38199

Indicators of Compromise

  • NFS mount operations hanging indefinitely without timeout or error messages
  • Increased number of stuck mount.nfs4 processes visible in process listings
  • System logs showing incomplete NFSv4 client initialization sequences
  • Applications experiencing timeouts when accessing NFS-mounted filesystems

Detection Strategies

  • Monitor for abnormal NFS mount operation durations exceeding expected timeouts
  • Track kernel logs for NFSv4 client initialization anomalies and trunking detection failures
  • Implement process monitoring to detect hung mount.nfs4 or related kernel threads
  • Use network monitoring to identify patterns of NFSv4 server unreachability during mount operations

Monitoring Recommendations

  • Configure NFS mount timeouts and alerting for operations exceeding normal duration thresholds
  • Implement system health checks that verify NFS mount responsiveness
  • Monitor NFSv4 server availability and network connectivity metrics
  • Enable detailed NFS client logging to capture connection establishment sequences

How to Mitigate CVE-2021-38199

Immediate Actions Required

  • Update Linux kernel to version 5.13.4 or later which contains the fix
  • Review and audit NFSv4 mount configurations in production environments
  • Implement network-level controls to ensure NFSv4 server reachability
  • Consider temporarily switching to NFSv3 if patching cannot be immediately applied

Patch Information

The vulnerability has been addressed in Linux kernel version 5.13.4. The fix, implemented in commit dd99e9f98fbf423ff6d365b37a98e8879170f17c, corrects the connection-setup ordering in the nfs4_alloc_client() function to properly initialize server connections before trunking detection.

Patch information is available through:

  • Linux Kernel ChangeLog 5.13.4
  • GitHub Commit dd99e9f

Distribution-specific patches are available from:

  • Debian Security Advisory DSA-4978
  • NetApp Security Advisory NTAP-20210902-0010

Workarounds

  • Ensure high availability and reliability of NFSv4 servers to reduce exposure
  • Implement network redundancy for critical NFSv4 infrastructure
  • Configure appropriate mount timeouts using NFS mount options
  • Use monitoring to detect and automatically recover from hung mount operations
bash
# Configuration example - NFS mount with timeout options
# Add timeout parameters to reduce impact of hanging mounts
mount -t nfs4 -o timeo=600,retrans=2,soft server:/export /mnt/nfs

# Verify current kernel version
uname -r

# Check if kernel version is patched (5.13.4 or later)
# If not, update using your distribution's package manager

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechLinux Kernel

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.34%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo
  • Technical References
  • Debian LTS Announcement October 2021

  • Debian LTS Announcement December 2021

  • NetApp Security Advisory NTAP-20210902-0010

  • Debian Security Advisory DSA-4978
  • Vendor Resources
  • Linux Kernel ChangeLog 5.13.4

  • GitHub Commit dd99e9f
  • Related CVEs
  • CVE-2026-31739: Linux Kernel Tegra Crypto DoS Vulnerability

  • CVE-2026-43054: Linux Kernel tcm_loop DOS Vulnerability

  • CVE-2026-31736: Linux Kernel MTK PPE DoS Vulnerability

  • CVE-2026-31727: Linux Kernel USB Gadget DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English