{
  "threat_severity" : "Moderate",
  "public_date" : "2025-10-01T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: ceph: fix race condition validating r_parent before applying state",
    "id" : "2400636",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2400636"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-364",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nceph: fix race condition validating r_parent before applying state\nAdd validation to ensure the cached parent directory inode matches the\ndirectory info in MDS replies. This prevents client-side race conditions\nwhere concurrent operations (e.g. rename) cause r_parent to become stale\nbetween request initiation and reply processing, which could lead to\napplying state changes to incorrect directory inodes.\n[ idryomov: folded a kerneldoc fixup and a follow-up fix from Alex to\nmove CEPH_CAP_PIN reference when r_parent is updated:\nWhen the parent directory lock is not held, req->r_parent can become\nstale and is updated to point to the correct inode.  However, the\nassociated CEPH_CAP_PIN reference was not being adjusted.  The\nCEPH_CAP_PIN is a reference on an inode that is tracked for\naccounting purposes.  Moving this pin is important to keep the\naccounting balanced. When the pin was not moved from the old parent\nto the new one, it created two problems: The reference on the old,\nstale parent was never released, causing a reference leak.\nA reference for the new parent was never acquired, creating the risk\nof a reference underflow later in ceph_mdsc_release_request().  This\npatch corrects the logic by releasing the pin from the old parent and\nacquiring it for the new parent when r_parent is switched.  This\nensures reference accounting stays balanced. ]" ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2025-10-02T00:00:00Z",
    "advisory" : "RHSA-2025:17241",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "kernel-0:5.14.0-427.92.1.el9_4"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-39927\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39927\nhttps://lore.kernel.org/linux-cve-announce/2025100125-CVE-2025-39927-5a57@gregkh/T" ],
  "name" : "CVE-2025-39927",
  "csaw" : false
}