CVE-2025-38711

In the Linux kernel, the following vulnerability has been resolved: smb/server: avoid deadlock when linking with ReplaceIfExists If smb2_create_link() is called with ReplaceIfExists set and the name does exist then a deadlock will happen. ksmbd_vfs_kern_path_locked() will return with success and the parent directory will be locked. ksmbd_vfs_remove_file() will then remove the file. ksmbd_vfs_link() will then be called while the parent is still locked. It will try to lock the same parent and will deadlock. This patch moves the ksmbd_vfs_kern_path_unlock() call to *before* ksmbd_vfs_link() and then simplifies the code, removing the file_present flag variable.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

09 Jan 2026, 16:11

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-667
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/1e858a7a51c7b8b009d8f246de7ceb7743b44a71 - () https://git.kernel.org/stable/c/1e858a7a51c7b8b009d8f246de7ceb7743b44a71 - Patch
References () https://git.kernel.org/stable/c/814cfdb6358d9b84fcbec9918c8f938cc096a43a - () https://git.kernel.org/stable/c/814cfdb6358d9b84fcbec9918c8f938cc096a43a - Patch
References () https://git.kernel.org/stable/c/9d5012ffe14120f978ee34aef4df3d6cb026b7c4 - () https://git.kernel.org/stable/c/9d5012ffe14120f978ee34aef4df3d6cb026b7c4 - Patch
References () https://git.kernel.org/stable/c/a726fef6d7d4cfc365d3434e3916dbfe78991a33 - () https://git.kernel.org/stable/c/a726fef6d7d4cfc365d3434e3916dbfe78991a33 - Patch
References () https://git.kernel.org/stable/c/a7dddd62578c2eb6cb28b8835556a121b5157323 - () https://git.kernel.org/stable/c/a7dddd62578c2eb6cb28b8835556a121b5157323 - Patch
References () https://git.kernel.org/stable/c/ac98d54630d5b52e3f684d872f0d82c06c418ea9 - () https://git.kernel.org/stable/c/ac98d54630d5b52e3f684d872f0d82c06c418ea9 - Patch
References () https://git.kernel.org/stable/c/d5fc1400a34b4ea5e8f2ce296ea12bf8c8421694 - () https://git.kernel.org/stable/c/d5fc1400a34b4ea5e8f2ce296ea12bf8c8421694 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

04 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-04 16:15

Updated : 2026-01-09 16:11


NVD link : CVE-2025-38711

Mitre link : CVE-2025-38711

CVE.ORG link : CVE-2025-38711


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-667

Improper Locking