-

CVE-2025-40231

In the Linux kernel, the following vulnerability has been resolved:

vsock: fix lock inversion in vsock_assign_transport()

Syzbot reported a potential lock inversion deadlock between
vsock_register_mutex and sk_lock-AF_VSOCK when vsock_linger() is called.

The issue was introduced by commit 687aa0c5581b ("vsock: Fix
transport_* TOCTOU") which added vsock_register_mutex locking in
vsock_assign_transport() around the transport->release() call, that can
call vsock_linger(). vsock_assign_transport() can be called with sk_lock
held. vsock_linger() calls sk_wait_event() that temporarily releases and
re-acquires sk_lock. During this window, if another thread hold
vsock_register_mutex while trying to acquire sk_lock, a circular
dependency is created.

Fix this by releasing vsock_register_mutex before calling
transport->release() and vsock_deassign_transport(). This is safe
because we don't need to hold vsock_register_mutex while releasing the
old transport, and we ensure the new transport won't disappear by
obtaining a module reference first via try_module_get().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < ce4f856c64f0bc30e29302a0ce41f4295ca391c5
Version 8667e8d0eb46bc54fdae30ba2f4786407d3d88eb
Status affected
Version < 09bba278ccde25a14b6e5088a9e65a8717d0cccf
Version 36a439049b34cca0b3661276049b84a1f76cc21a
Status affected
Version < b44182c116778feaa05da52a426aeb9da1878dcf
Version 9ce53e744f18e73059d3124070e960f3aa9902bf
Status affected
Version < 42ed0784d11adebf748711e503af0eb9f1e6d81d
Version 9d24bb6780282b0255b9929abe5e8f98007e2c6e
Status affected
Version < 251caee792a21eb0b781aab91362b422c945e162
Version ae2c712ba39c7007de63cb0c75b51ce1caaf1da5
Status affected
Version < a2a4346eea8b4cb75037dbcb20b98cb454324f80
Version 687aa0c5581b8d4aa87fd92973e4ee576b550cdf
Status affected
Version < f7c877e7535260cc7a21484c994e8ce7e8cb6780
Version 687aa0c5581b8d4aa87fd92973e4ee576b550cdf
Status affected
Version 7b73bddf54777fb62d4d8c7729d0affe6df04477
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 6.16
Status affected
Version < 6.16
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.246
Status unaffected
Version <= 5.15.*
Version 5.15.196
Status unaffected
Version <= 6.1.*
Version 6.1.158
Status unaffected
Version <= 6.6.*
Version 6.6.115
Status unaffected
Version <= 6.12.*
Version 6.12.56
Status unaffected
Version <= 6.17.*
Version 6.17.6
Status unaffected
Version <= *
Version 6.18
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.087
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String