๐Ÿ” CVE Alert

CVE-2025-39819

UNKNOWN 0.0

fs/smb: Fix inconsistent refcnt update

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: fs/smb: Fix inconsistent refcnt update A possible inconsistent update of refcount was identified in `smb2_compound_op`. Such inconsistent update could lead to possible resource leaks. Why it is a possible bug: 1. In the comment section of the function, it clearly states that the reference to `cfile` should be dropped after calling this function. 2. Every control flow path would check and drop the reference to `cfile`, except the patched one. 3. Existing callers would not handle refcount update of `cfile` if -ENOMEM is returned. To fix the bug, an extra goto label "out" is added, to make sure that the cleanup logic would always be respected. As the problem is caused by the allocation failure of `vars`, the cleanup logic between label "finished" and "out" can be safely ignored. According to the definition of function `is_replayable_error`, the error code of "-ENOMEM" is not recoverable. Therefore, the replay logic also gets ignored.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 16, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
a7d5c294628088781da9e91cbb034d61c3a71f71 < 3fc11ff13fbc2749871d6ac2141685cf54699997 a7d5c294628088781da9e91cbb034d61c3a71f71 < 4191ea1f0bb3e27d65c5dcde7bd00e709ec67141 a7d5c294628088781da9e91cbb034d61c3a71f71 < 4735f5991f51468b85affb8366b7067248457a71 a7d5c294628088781da9e91cbb034d61c3a71f71 < cc82c6dff548f0066a51a6e577c7454e7d26a968 a7d5c294628088781da9e91cbb034d61c3a71f71 < ab529e6ca1f67bcf31f3ea80c72bffde2e9e053e
Linux / Linux
5.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3fc11ff13fbc2749871d6ac2141685cf54699997 git.kernel.org: https://git.kernel.org/stable/c/4191ea1f0bb3e27d65c5dcde7bd00e709ec67141 git.kernel.org: https://git.kernel.org/stable/c/4735f5991f51468b85affb8366b7067248457a71 git.kernel.org: https://git.kernel.org/stable/c/cc82c6dff548f0066a51a6e577c7454e7d26a968 git.kernel.org: https://git.kernel.org/stable/c/ab529e6ca1f67bcf31f3ea80c72bffde2e9e053e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html