CVE-2025-38244
BaseFortify
Publication date: 2025-07-09
Last updated on: 2025-11-20
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a potential deadlock issue in the Linux kernel's SMB client implementation. Specifically, it occurs when reconnecting channels due to incorrect lock ordering in the function cifs_signal_cifsd_for_reconnect(). The improper lock order can cause a circular locking dependency, leading to a deadlock where multiple locks are held simultaneously and each is waiting for another, preventing progress.
How can this vulnerability impact me? :
This vulnerability can cause the SMB client in the Linux kernel to deadlock during channel reconnection attempts. This deadlock can halt or severely delay SMB-related operations, potentially causing system hangs or degraded performance when accessing SMB shares, impacting system stability and availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for deadlock warnings related to the SMB client in the Linux kernel logs. Specifically, look for messages indicating circular locking dependencies involving cifsd and locks such as tcp_ses->srv_lock, ret_buf->ses_lock, and ret_buf->chan_lock. You can check the kernel log using commands like 'dmesg | grep -i deadlock' or 'journalctl -k | grep -i deadlock' to find such warnings.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where this deadlock issue in the SMB client has been fixed. The fix involves correcting the lock order in cifs_signal_cifsd_for_reconnect() to prevent the deadlock. Until the update is applied, avoid workloads or operations that trigger SMB channel reconnections which may cause the deadlock.