๐Ÿ” CVE Alert

CVE-2025-39697

UNKNOWN 0.0

NFS: Fix a race when updating an existing write

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix a race when updating an existing write After nfs_lock_and_join_requests() tests for whether the request is still attached to the mapping, nothing prevents a call to nfs_inode_remove_request() from succeeding until we actually lock the page group. The reason is that whoever called nfs_inode_remove_request() doesn't necessarily have a lock on the page group head. So in order to avoid races, let's take the page group lock earlier in nfs_lock_and_join_requests(), and hold it across the removal of the request in nfs_inode_remove_request().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 5, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
bd37d6fce184836bd5e7cd90ce40116a4fadaf2a < 0ff42a32784e0f2cb46a46da8e9f473538c13e1b bd37d6fce184836bd5e7cd90ce40116a4fadaf2a < f230d40147cc37eb3aef4d50e2e2c06ea73d9a77 bd37d6fce184836bd5e7cd90ce40116a4fadaf2a < c32e3c71aaa1c1ba05da88605e2ddd493c58794f bd37d6fce184836bd5e7cd90ce40116a4fadaf2a < 181feb41f0b268e6288bf9a7b984624d7fe2031d bd37d6fce184836bd5e7cd90ce40116a4fadaf2a < 92278ae36935a54e65fef9f8ea8efe7e80481ace bd37d6fce184836bd5e7cd90ce40116a4fadaf2a < 202a3432d21ac060629a760fff3b0a39859da3ea bd37d6fce184836bd5e7cd90ce40116a4fadaf2a < 76d2e3890fb169168c73f2e4f8375c7cc24a765e
Linux / Linux
4.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/0ff42a32784e0f2cb46a46da8e9f473538c13e1b git.kernel.org: https://git.kernel.org/stable/c/f230d40147cc37eb3aef4d50e2e2c06ea73d9a77 git.kernel.org: https://git.kernel.org/stable/c/c32e3c71aaa1c1ba05da88605e2ddd493c58794f git.kernel.org: https://git.kernel.org/stable/c/181feb41f0b268e6288bf9a7b984624d7fe2031d git.kernel.org: https://git.kernel.org/stable/c/92278ae36935a54e65fef9f8ea8efe7e80481ace git.kernel.org: https://git.kernel.org/stable/c/202a3432d21ac060629a760fff3b0a39859da3ea git.kernel.org: https://git.kernel.org/stable/c/76d2e3890fb169168c73f2e4f8375c7cc24a765e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html