CVE-2025-39825

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix race with concurrent opens in rename(2) Besides sending the rename request to the server, the rename process also involves closing any deferred close, waiting for outstanding I/O to complete as well as marking all existing open handles as deleted to prevent them from deferring closes, which increases the race window for potential concurrent opens on the target file. Fix this by unhashing the dentry in advance to prevent any concurrent opens on the target.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Jan 2026, 20:37

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-362
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/24b9ed739c8c5b464d983e12cf308982f3ae93c2 - () https://git.kernel.org/stable/c/24b9ed739c8c5b464d983e12cf308982f3ae93c2 - Patch
References () https://git.kernel.org/stable/c/289f945acb20b9b54fe4d13895e44aa58965ddb2 - () https://git.kernel.org/stable/c/289f945acb20b9b54fe4d13895e44aa58965ddb2 - Patch
References () https://git.kernel.org/stable/c/c9991af5e09924f6f3b3e6996a5e09f9504b4358 - () https://git.kernel.org/stable/c/c9991af5e09924f6f3b3e6996a5e09f9504b4358 - Patch
References () https://git.kernel.org/stable/c/c9e7de284da0be5b44dbe79d71573f9f7f9b144c - () https://git.kernel.org/stable/c/c9e7de284da0be5b44dbe79d71573f9f7f9b144c - Patch
References () https://git.kernel.org/stable/c/d84291fc7453df7881a970716f8256273aca5747 - () https://git.kernel.org/stable/c/d84291fc7453df7881a970716f8256273aca5747 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

16 Sep 2025, 13:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-16 13:16

Updated : 2026-01-16 20:37


NVD link : CVE-2025-39825

Mitre link : CVE-2025-39825

CVE.ORG link : CVE-2025-39825


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')