CVE-2025-38393
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
25/07/2025
Last modified:
23/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN<br />
<br />
We found a few different systems hung up in writeback waiting on the same<br />
page lock, and one task waiting on the NFS_LAYOUT_DRAIN bit in<br />
pnfs_update_layout(), however the pnfs_layout_hdr&#39;s plh_outstanding count<br />
was zero.<br />
<br />
It seems most likely that this is another race between the waiter and waker<br />
similar to commit ed0172af5d6f ("SUNRPC: Fix a race to wake a sync task").<br />
Fix it up by applying the advised barrier.
Impact
Base Score 3.x
4.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.124 (including) | 5.10.240 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.49 (including) | 5.15.187 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18.6 (including) | 5.19 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.19.1 (including) | 6.1.144 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.97 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.37 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.19:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc8:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/08287df60bac5b008b6bcdb03053988335d3d282
- https://git.kernel.org/stable/c/1f4da20080718f258e189a2c5f515385fa393da6
- https://git.kernel.org/stable/c/864a54c1243ed3ca60baa4bc492dede1361f4c83
- https://git.kernel.org/stable/c/8846fd02c98da8b79e6343a20e6071be6f372180
- https://git.kernel.org/stable/c/8ca65fa71024a1767a59ffbc6a6e2278af84735e
- https://git.kernel.org/stable/c/c01776287414ca43412d1319d2877cbad65444ac
- https://git.kernel.org/stable/c/e4b13885e7ef1e64e45268feef1e5f0707c47e72
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



