CVE-2025-40103
Description
In the Linux kernel, the following vulnerability has been resolved:
smb: client: Fix refcount leak for cifs_sb_tlink
Fix three refcount inconsistency issues related to cifs_sb_tlink.
Comments for cifs_sb_tlink state that cifs_put_tlink() needs to be called after successful calls to cifs_sb_tlink(). Three calls fail to update refcount accordingly, leading to possible resource leaks.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Three call sites in the Linux kernel's SMB client fail to decrement the reference count obtained by cifs_sb_tlink(), leading to possible memory leaks.
Vulnerability
Description
The Linux kernel's SMB client implementation contains a reference count leak vulnerability in the cifs_sb_tlink function. According to the official CVE description, the comments for cifs_sb_tlink explicitly state that cifs_put_tlink() must be called after a successful cifs_sb_tlink() call. However, three call sites fail to perform this cleanup, causing the reference count to remain elevated and resulting in resource leaks.
Attack
Vector and Prerequisites
An attacker can trigger the vulnerable code paths through normal SMB filesystem operations. The attack requires network access to a CIFS/SMB share and the ability to initiate operations that invoke the three affected call sites. No special privileges beyond standard file system access are needed, though the attacker must be able to cause repeated calls to these functions to maximize the leak.
Impact
Successful exploitation leads to a gradual memory leak in the kernel, as the unreleased references consume kernel memory over time. In a worst-case scenario, an attacker could exhaust system memory, potentially causing a denial of service (DoS) condition by crashing the system or making it unresponsive.
Mitigation
Patches addressing this issue have been committed to the Linux kernel stable trees. Users should update their kernel to the latest stable version that includes the fix. There is no known workaround other than applying the patch or disabling SMB client functionality if not needed.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
5790282abe9d8d7dd034c1492e15605b68b49896bb31e1416c2b77f42205eVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/790282abe9d805f08618c1c24ea2529e7259b692nvd
- git.kernel.org/stable/c/896bb31e1416f582503db1350cf1bd10dc64e5a6nvd
- git.kernel.org/stable/c/c2b77f42205ef485a647f62082c442c1cd69d3fcnvd
- git.kernel.org/stable/c/d3c8ea197055c260119a13360e8202a27e53e1e4nvd
- git.kernel.org/stable/c/d7dd034c14928306db1b46be277ae439b84dacf9nvd
- git.kernel.org/stable/c/e15605b68b490186da2ad8029c0351a9cfb0b9afnvd
News mentions
0No linked articles in our index yet.