CVE-2025-39734

In the Linux kernel, the following vulnerability has been resolved: Revert "fs/ntfs3: Replace inode_trylock with inode_lock" This reverts commit 69505fe98f198ee813898cbcaf6770949636430b. Initially, conditional lock acquisition was removed to fix an xfstest bug that was observed during internal testing. The deadlock reported by syzbot is resolved by reintroducing conditional acquisition. The xfstest bug no longer occurs on kernel version 6.16-rc1 during internal testing. I assume that changes in other modules may have contributed to this.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

12 Jan 2026, 15:42

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1903a6c1f2818154f6bc87bceaaecafa92b6ac5c - () https://git.kernel.org/stable/c/1903a6c1f2818154f6bc87bceaaecafa92b6ac5c - Patch
References () https://git.kernel.org/stable/c/7ce6f83ca9d52c9245b7a017466fc4baa1241b0b - () https://git.kernel.org/stable/c/7ce6f83ca9d52c9245b7a017466fc4baa1241b0b - Patch
References () https://git.kernel.org/stable/c/a49f0abd8959048af18c6c690b065eb0d65b2d21 - () https://git.kernel.org/stable/c/a49f0abd8959048af18c6c690b065eb0d65b2d21 - Patch
References () https://git.kernel.org/stable/c/a936be9b5f51c4d23f66fb673e9068c6b08104a4 - () https://git.kernel.org/stable/c/a936be9b5f51c4d23f66fb673e9068c6b08104a4 - Patch
References () https://git.kernel.org/stable/c/b356ee013a79e7e3147bfe065de376706c5d2ee9 - () https://git.kernel.org/stable/c/b356ee013a79e7e3147bfe065de376706c5d2ee9 - Patch
References () https://git.kernel.org/stable/c/bd20733746263acaaf2a21881665db27ee4303d5 - () https://git.kernel.org/stable/c/bd20733746263acaaf2a21881665db27ee4303d5 - Patch
References () https://git.kernel.org/stable/c/bec8109f957a6e193e52d1728799994c8005ca83 - () https://git.kernel.org/stable/c/bec8109f957a6e193e52d1728799994c8005ca83 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE NVD-CWE-noinfo

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

07 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-07 16:15

Updated : 2026-01-12 15:42


NVD link : CVE-2025-39734

Mitre link : CVE-2025-39734

CVE.ORG link : CVE-2025-39734


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel