-
CVE-2025-40231
- EPSS 0.03%
- Veröffentlicht 04.12.2025 15:31:22
- Zuletzt bearbeitet 04.12.2025 17:15:08
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
vsock: fix lock inversion in vsock_assign_transport()
Syzbot reported a potential lock inversion deadlock between
vsock_register_mutex and sk_lock-AF_VSOCK when vsock_linger() is called.
The issue was introduced by commit 687aa0c5581b ("vsock: Fix
transport_* TOCTOU") which added vsock_register_mutex locking in
vsock_assign_transport() around the transport->release() call, that can
call vsock_linger(). vsock_assign_transport() can be called with sk_lock
held. vsock_linger() calls sk_wait_event() that temporarily releases and
re-acquires sk_lock. During this window, if another thread hold
vsock_register_mutex while trying to acquire sk_lock, a circular
dependency is created.
Fix this by releasing vsock_register_mutex before calling
transport->release() and vsock_deassign_transport(). This is safe
because we don't need to hold vsock_register_mutex while releasing the
old transport, and we ensure the new transport won't disappear by
obtaining a module reference first via try_module_get().Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
ce4f856c64f0bc30e29302a0ce41f4295ca391c5
Version
8667e8d0eb46bc54fdae30ba2f4786407d3d88eb
Status
affected
Version <
09bba278ccde25a14b6e5088a9e65a8717d0cccf
Version
36a439049b34cca0b3661276049b84a1f76cc21a
Status
affected
Version <
b44182c116778feaa05da52a426aeb9da1878dcf
Version
9ce53e744f18e73059d3124070e960f3aa9902bf
Status
affected
Version <
42ed0784d11adebf748711e503af0eb9f1e6d81d
Version
9d24bb6780282b0255b9929abe5e8f98007e2c6e
Status
affected
Version <
251caee792a21eb0b781aab91362b422c945e162
Version
ae2c712ba39c7007de63cb0c75b51ce1caaf1da5
Status
affected
Version <
a2a4346eea8b4cb75037dbcb20b98cb454324f80
Version
687aa0c5581b8d4aa87fd92973e4ee576b550cdf
Status
affected
Version <
f7c877e7535260cc7a21484c994e8ce7e8cb6780
Version
687aa0c5581b8d4aa87fd92973e4ee576b550cdf
Status
affected
Version
7b73bddf54777fb62d4d8c7729d0affe6df04477
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.16
Status
affected
Version <
6.16
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.246
Status
unaffected
Version <=
5.15.*
Version
5.15.196
Status
unaffected
Version <=
6.1.*
Version
6.1.158
Status
unaffected
Version <=
6.6.*
Version
6.6.115
Status
unaffected
Version <=
6.12.*
Version
6.12.56
Status
unaffected
Version <=
6.17.*
Version
6.17.6
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.087 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|