CVE-2025-40231 (GCVE-0-2025-40231)
Vulnerability from cvelistv5
Published
2025-12-04 15:31
Modified
2025-12-04 15:31
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: vsock: fix lock inversion in vsock_assign_transport() Syzbot reported a potential lock inversion deadlock between vsock_register_mutex and sk_lock-AF_VSOCK when vsock_linger() is called. The issue was introduced by commit 687aa0c5581b ("vsock: Fix transport_* TOCTOU") which added vsock_register_mutex locking in vsock_assign_transport() around the transport->release() call, that can call vsock_linger(). vsock_assign_transport() can be called with sk_lock held. vsock_linger() calls sk_wait_event() that temporarily releases and re-acquires sk_lock. During this window, if another thread hold vsock_register_mutex while trying to acquire sk_lock, a circular dependency is created. Fix this by releasing vsock_register_mutex before calling transport->release() and vsock_deassign_transport(). This is safe because we don't need to hold vsock_register_mutex while releasing the old transport, and we ensure the new transport won't disappear by obtaining a module reference first via try_module_get().
Impacted products
Vendor Product Version
Linux Linux Version: 8667e8d0eb46bc54fdae30ba2f4786407d3d88eb
Version: 36a439049b34cca0b3661276049b84a1f76cc21a
Version: 9ce53e744f18e73059d3124070e960f3aa9902bf
Version: 9d24bb6780282b0255b9929abe5e8f98007e2c6e
Version: ae2c712ba39c7007de63cb0c75b51ce1caaf1da5
Version: 687aa0c5581b8d4aa87fd92973e4ee576b550cdf
Version: 687aa0c5581b8d4aa87fd92973e4ee576b550cdf
Version: 7b73bddf54777fb62d4d8c7729d0affe6df04477
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/vmw_vsock/af_vsock.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "ce4f856c64f0bc30e29302a0ce41f4295ca391c5",
              "status": "affected",
              "version": "8667e8d0eb46bc54fdae30ba2f4786407d3d88eb",
              "versionType": "git"
            },
            {
              "lessThan": "09bba278ccde25a14b6e5088a9e65a8717d0cccf",
              "status": "affected",
              "version": "36a439049b34cca0b3661276049b84a1f76cc21a",
              "versionType": "git"
            },
            {
              "lessThan": "b44182c116778feaa05da52a426aeb9da1878dcf",
              "status": "affected",
              "version": "9ce53e744f18e73059d3124070e960f3aa9902bf",
              "versionType": "git"
            },
            {
              "lessThan": "42ed0784d11adebf748711e503af0eb9f1e6d81d",
              "status": "affected",
              "version": "9d24bb6780282b0255b9929abe5e8f98007e2c6e",
              "versionType": "git"
            },
            {
              "lessThan": "251caee792a21eb0b781aab91362b422c945e162",
              "status": "affected",
              "version": "ae2c712ba39c7007de63cb0c75b51ce1caaf1da5",
              "versionType": "git"
            },
            {
              "lessThan": "a2a4346eea8b4cb75037dbcb20b98cb454324f80",
              "status": "affected",
              "version": "687aa0c5581b8d4aa87fd92973e4ee576b550cdf",
              "versionType": "git"
            },
            {
              "lessThan": "f7c877e7535260cc7a21484c994e8ce7e8cb6780",
              "status": "affected",
              "version": "687aa0c5581b8d4aa87fd92973e4ee576b550cdf",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "7b73bddf54777fb62d4d8c7729d0affe6df04477",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/vmw_vsock/af_vsock.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.16"
            },
            {
              "lessThan": "6.16",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.246",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.196",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.158",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.115",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.56",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.17.*",
              "status": "unaffected",
              "version": "6.17.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.18",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.246",
                  "versionStartIncluding": "5.10.240",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.196",
                  "versionStartIncluding": "5.15.189",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.158",
                  "versionStartIncluding": "6.1.146",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.115",
                  "versionStartIncluding": "6.6.99",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.56",
                  "versionStartIncluding": "6.12.39",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.17.6",
                  "versionStartIncluding": "6.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18",
                  "versionStartIncluding": "6.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.15.7",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: fix lock inversion in vsock_assign_transport()\n\nSyzbot reported a potential lock inversion deadlock between\nvsock_register_mutex and sk_lock-AF_VSOCK when vsock_linger() is called.\n\nThe issue was introduced by commit 687aa0c5581b (\"vsock: Fix\ntransport_* TOCTOU\") which added vsock_register_mutex locking in\nvsock_assign_transport() around the transport-\u003erelease() call, that can\ncall vsock_linger(). vsock_assign_transport() can be called with sk_lock\nheld. vsock_linger() calls sk_wait_event() that temporarily releases and\nre-acquires sk_lock. During this window, if another thread hold\nvsock_register_mutex while trying to acquire sk_lock, a circular\ndependency is created.\n\nFix this by releasing vsock_register_mutex before calling\ntransport-\u003erelease() and vsock_deassign_transport(). This is safe\nbecause we don\u0027t need to hold vsock_register_mutex while releasing the\nold transport, and we ensure the new transport won\u0027t disappear by\nobtaining a module reference first via try_module_get()."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-04T15:31:22.199Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/ce4f856c64f0bc30e29302a0ce41f4295ca391c5"
        },
        {
          "url": "https://git.kernel.org/stable/c/09bba278ccde25a14b6e5088a9e65a8717d0cccf"
        },
        {
          "url": "https://git.kernel.org/stable/c/b44182c116778feaa05da52a426aeb9da1878dcf"
        },
        {
          "url": "https://git.kernel.org/stable/c/42ed0784d11adebf748711e503af0eb9f1e6d81d"
        },
        {
          "url": "https://git.kernel.org/stable/c/251caee792a21eb0b781aab91362b422c945e162"
        },
        {
          "url": "https://git.kernel.org/stable/c/a2a4346eea8b4cb75037dbcb20b98cb454324f80"
        },
        {
          "url": "https://git.kernel.org/stable/c/f7c877e7535260cc7a21484c994e8ce7e8cb6780"
        }
      ],
      "title": "vsock: fix lock inversion in vsock_assign_transport()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-40231",
    "datePublished": "2025-12-04T15:31:22.199Z",
    "dateReserved": "2025-04-16T07:20:57.180Z",
    "dateUpdated": "2025-12-04T15:31:22.199Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-40231\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-04T16:16:15.870\",\"lastModified\":\"2025-12-04T17:15:08.283\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvsock: fix lock inversion in vsock_assign_transport()\\n\\nSyzbot reported a potential lock inversion deadlock between\\nvsock_register_mutex and sk_lock-AF_VSOCK when vsock_linger() is called.\\n\\nThe issue was introduced by commit 687aa0c5581b (\\\"vsock: Fix\\ntransport_* TOCTOU\\\") which added vsock_register_mutex locking in\\nvsock_assign_transport() around the transport-\u003erelease() call, that can\\ncall vsock_linger(). vsock_assign_transport() can be called with sk_lock\\nheld. vsock_linger() calls sk_wait_event() that temporarily releases and\\nre-acquires sk_lock. During this window, if another thread hold\\nvsock_register_mutex while trying to acquire sk_lock, a circular\\ndependency is created.\\n\\nFix this by releasing vsock_register_mutex before calling\\ntransport-\u003erelease() and vsock_deassign_transport(). This is safe\\nbecause we don\u0027t need to hold vsock_register_mutex while releasing the\\nold transport, and we ensure the new transport won\u0027t disappear by\\nobtaining a module reference first via try_module_get().\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/09bba278ccde25a14b6e5088a9e65a8717d0cccf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/251caee792a21eb0b781aab91362b422c945e162\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/42ed0784d11adebf748711e503af0eb9f1e6d81d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a2a4346eea8b4cb75037dbcb20b98cb454324f80\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b44182c116778feaa05da52a426aeb9da1878dcf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ce4f856c64f0bc30e29302a0ce41f4295ca391c5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f7c877e7535260cc7a21484c994e8ce7e8cb6780\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…