VYPR
Unrated severityNVD Advisory· Published Oct 30, 2025· Updated Apr 18, 2026

CVE-2025-40103

CVE-2025-40103

Description

In the Linux kernel, the following vulnerability has been resolved:

smb: client: Fix refcount leak for cifs_sb_tlink

Fix three refcount inconsistency issues related to cifs_sb_tlink.

Comments for cifs_sb_tlink state that cifs_put_tlink() needs to be called after successful calls to cifs_sb_tlink(). Three calls fail to update refcount accordingly, leading to possible resource leaks.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Three call sites in the Linux kernel's SMB client fail to decrement the reference count obtained by cifs_sb_tlink(), leading to possible memory leaks.

Vulnerability

Description

The Linux kernel's SMB client implementation contains a reference count leak vulnerability in the cifs_sb_tlink function. According to the official CVE description, the comments for cifs_sb_tlink explicitly state that cifs_put_tlink() must be called after a successful cifs_sb_tlink() call. However, three call sites fail to perform this cleanup, causing the reference count to remain elevated and resulting in resource leaks.

Attack

Vector and Prerequisites

An attacker can trigger the vulnerable code paths through normal SMB filesystem operations. The attack requires network access to a CIFS/SMB share and the ability to initiate operations that invoke the three affected call sites. No special privileges beyond standard file system access are needed, though the attacker must be able to cause repeated calls to these functions to maximize the leak.

Impact

Successful exploitation leads to a gradual memory leak in the kernel, as the unreleased references consume kernel memory over time. In a worst-case scenario, an attacker could exhaust system memory, potentially causing a denial of service (DoS) condition by crashing the system or making it unresponsive.

Mitigation

Patches addressing this issue have been committed to the Linux kernel stable trees. Users should update their kernel to the latest stable version that includes the fix. There is no known workaround other than applying the patch or disabling SMB client functionality if not needed.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.