In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix smbdirectrecvio leak in smbd_negotiate() error path
During tests of another unrelated patch I was able to trigger this error: Objects remaining on _kmemcache_shutdown()
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"314707200209501795661268724880646341945",
"24670635959708254456188417748428978696",
"46921869485516434062500526501775168581",
"192613670384673261113458260683303337973",
"194452368641068419919785403850103136718"
]
},
"target": {
"file": "fs/smb/client/smbdirect.c"
},
"signature_version": "v1",
"id": "CVE-2025-39929-06d4a172",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0991418bf98f191d0c320bd25245fcffa1998c7e",
"signature_type": "Line"
},
{
"digest": {
"function_hash": "18850129676396418514199809044261854770",
"length": 787.0
},
"target": {
"file": "fs/smb/client/smbdirect.c",
"function": "smbd_negotiate"
},
"signature_version": "v1",
"id": "CVE-2025-39929-0881c3b4",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@922338efaad63cfe30d459dfc59f9d69ff93ded4",
"signature_type": "Function"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"314707200209501795661268724880646341945",
"24670635959708254456188417748428978696",
"46921869485516434062500526501775168581",
"192613670384673261113458260683303337973",
"194452368641068419919785403850103136718"
]
},
"target": {
"file": "fs/smb/client/smbdirect.c"
},
"signature_version": "v1",
"id": "CVE-2025-39929-27e47a90",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3d7c075c878ac844e33c43e506c2fa27ac7e9689",
"signature_type": "Line"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"314707200209501795661268724880646341945",
"24670635959708254456188417748428978696",
"46921869485516434062500526501775168581",
"192613670384673261113458260683303337973",
"194452368641068419919785403850103136718"
]
},
"target": {
"file": "fs/smb/client/smbdirect.c"
},
"signature_version": "v1",
"id": "CVE-2025-39929-6a9f87d6",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@922338efaad63cfe30d459dfc59f9d69ff93ded4",
"signature_type": "Line"
},
{
"digest": {
"function_hash": "18850129676396418514199809044261854770",
"length": 787.0
},
"target": {
"file": "fs/smb/client/smbdirect.c",
"function": "smbd_negotiate"
},
"signature_version": "v1",
"id": "CVE-2025-39929-7c169eef",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7b7a93879558e77d950f1ff9a6f3daa385b33df",
"signature_type": "Function"
},
{
"digest": {
"function_hash": "141966341503122600725060587313045075815",
"length": 846.0
},
"target": {
"file": "fs/smb/client/smbdirect.c",
"function": "smbd_negotiate"
},
"signature_version": "v1",
"id": "CVE-2025-39929-8c9c9e47",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@daac51c7032036a0ca5f1aa419ad1b0471d1c6e0",
"signature_type": "Function"
},
{
"digest": {
"function_hash": "141966341503122600725060587313045075815",
"length": 846.0
},
"target": {
"file": "fs/smb/client/smbdirect.c",
"function": "smbd_negotiate"
},
"signature_version": "v1",
"id": "CVE-2025-39929-b416b84c",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0991418bf98f191d0c320bd25245fcffa1998c7e",
"signature_type": "Function"
},
{
"digest": {
"function_hash": "18850129676396418514199809044261854770",
"length": 787.0
},
"target": {
"file": "fs/smb/client/smbdirect.c",
"function": "smbd_negotiate"
},
"signature_version": "v1",
"id": "CVE-2025-39929-c3936b98",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3d7c075c878ac844e33c43e506c2fa27ac7e9689",
"signature_type": "Function"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"314707200209501795661268724880646341945",
"24670635959708254456188417748428978696",
"46921869485516434062500526501775168581",
"192613670384673261113458260683303337973",
"194452368641068419919785403850103136718"
]
},
"target": {
"file": "fs/smb/client/smbdirect.c"
},
"signature_version": "v1",
"id": "CVE-2025-39929-d3e6a927",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7b7a93879558e77d950f1ff9a6f3daa385b33df",
"signature_type": "Line"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"314707200209501795661268724880646341945",
"24670635959708254456188417748428978696",
"46921869485516434062500526501775168581",
"192613670384673261113458260683303337973",
"194452368641068419919785403850103136718"
]
},
"target": {
"file": "fs/smb/client/smbdirect.c"
},
"signature_version": "v1",
"id": "CVE-2025-39929-fb9a9d73",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@daac51c7032036a0ca5f1aa419ad1b0471d1c6e0",
"signature_type": "Line"
}
]