CVE-2025-39825

medium

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix race with concurrent opens in rename(2) Besides sending the rename request to the server, the rename process also involves closing any deferred close, waiting for outstanding I/O to complete as well as marking all existing open handles as deleted to prevent them from deferring closes, which increases the race window for potential concurrent opens on the target file. Fix this by unhashing the dentry in advance to prevent any concurrent opens on the target.

References

https://git.kernel.org/stable/c/d84291fc7453df7881a970716f8256273aca5747

https://git.kernel.org/stable/c/c9e7de284da0be5b44dbe79d71573f9f7f9b144c

https://git.kernel.org/stable/c/c9991af5e09924f6f3b3e6996a5e09f9504b4358

https://git.kernel.org/stable/c/289f945acb20b9b54fe4d13895e44aa58965ddb2

https://git.kernel.org/stable/c/24b9ed739c8c5b464d983e12cf308982f3ae93c2

Details

Source: Mitre, NVD

Published: 2025-09-16

Updated: 2025-09-17

Risk Information

CVSS v2

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 4.7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00018