{"id":"CVE-2025-39697","summary":"NFS: Fix a race when updating an existing write","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix a race when updating an existing write\n\nAfter nfs_lock_and_join_requests() tests for whether the request is\nstill attached to the mapping, nothing prevents a call to\nnfs_inode_remove_request() from succeeding until we actually lock the\npage group.\nThe reason is that whoever called nfs_inode_remove_request() doesn't\nnecessarily have a lock on the page group head.\n\nSo in order to avoid races, let's take the page group lock earlier in\nnfs_lock_and_join_requests(), and hold it across the removal of the\nrequest in nfs_inode_remove_request().","modified":"2026-03-20T12:43:00.557701Z","published":"2025-09-05T17:21:03.178Z","related":["ALSA-2025:21917","ALSA-2025:21920","SUSE-SU-2025:21040-1","SUSE-SU-2025:21052-1","SUSE-SU-2025:21056-1","SUSE-SU-2025:21064-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4128-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4140-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4301-1","openSUSE-SU-2025:20081-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39697.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0ff42a32784e0f2cb46a46da8e9f473538c13e1b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/181feb41f0b268e6288bf9a7b984624d7fe2031d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/202a3432d21ac060629a760fff3b0a39859da3ea"},{"type":"WEB","url":"https://git.kernel.org/stable/c/76d2e3890fb169168c73f2e4f8375c7cc24a765e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/92278ae36935a54e65fef9f8ea8efe7e80481ace"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c32e3c71aaa1c1ba05da88605e2ddd493c58794f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f230d40147cc37eb3aef4d50e2e2c06ea73d9a77"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39697.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39697"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"bd37d6fce184836bd5e7cd90ce40116a4fadaf2a"},{"fixed":"0ff42a32784e0f2cb46a46da8e9f473538c13e1b"},{"fixed":"f230d40147cc37eb3aef4d50e2e2c06ea73d9a77"},{"fixed":"c32e3c71aaa1c1ba05da88605e2ddd493c58794f"},{"fixed":"181feb41f0b268e6288bf9a7b984624d7fe2031d"},{"fixed":"92278ae36935a54e65fef9f8ea8efe7e80481ace"},{"fixed":"202a3432d21ac060629a760fff3b0a39859da3ea"},{"fixed":"76d2e3890fb169168c73f2e4f8375c7cc24a765e"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39697.json"}}],"schema_version":"1.7.5"}