In the Linux kernel, the following vulnerability has been resolved:
NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN
We found a few different systems hung up in writeback waiting on the same
page lock, and one task waiting on the NFS_LAYOUT_DRAIN bit in
pnfs_update_layout(), however the pnfs_layout_hdr's plh_outstanding count
was zero.
It seems most likely that this is another race between the waiter and waker
similar to commit ed0172af5d6f ("SUNRPC: Fix a race to wake a sync task").
Fix it up by applying the advised barrier.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2025, 19:31
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/08287df60bac5b008b6bcdb03053988335d3d282 - Patch | |
| References | () https://git.kernel.org/stable/c/1f4da20080718f258e189a2c5f515385fa393da6 - Patch | |
| References | () https://git.kernel.org/stable/c/864a54c1243ed3ca60baa4bc492dede1361f4c83 - Patch | |
| References | () https://git.kernel.org/stable/c/8846fd02c98da8b79e6343a20e6071be6f372180 - Patch | |
| References | () https://git.kernel.org/stable/c/8ca65fa71024a1767a59ffbc6a6e2278af84735e - Patch | |
| References | () https://git.kernel.org/stable/c/c01776287414ca43412d1319d2877cbad65444ac - Patch | |
| References | () https://git.kernel.org/stable/c/e4b13885e7ef1e64e45268feef1e5f0707c47e72 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc8:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:* |
|
| CWE | CWE-362 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
25 Jul 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-25 13:15
Updated : 2025-12-23 19:31
NVD link : CVE-2025-38393
Mitre link : CVE-2025-38393
CVE.ORG link : CVE-2025-38393
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
